scispace - formally typeset
Search or ask a question
Conference

International Conference on VLSI Design 

About: International Conference on VLSI Design is an academic conference. The conference publishes majorly in the area(s): CMOS & Very-large-scale integration. Over the lifetime, 2915 publications have been published by the conference receiving 30374 citations.


Papers
More filters
Proceedings Article
L.K. Grover1
01 Jan 1999
TL;DR: This paper introduces quantum mechanics and shows how this can be used for computation in devices designed to carry out classical functions.
Abstract: As device structures get smaller quantum mechanical effects predominate. About twenty years ago it was shown that it was possible to redesign devices so that they could still carry out the same functions. Recently it has been shown that the processing speed of computers based on quantum mechanics is indeed far superior to their classical counterparts for some important applications. This paper introduces quantum mechanics and shows how this can be used for computation.

545 citations

Proceedings ArticleDOI
04 Jan 2003
TL;DR: This paper presents a modular and extensible high-level synthesis research system that takes a behavioral description in ANSI-C as input and produces synthesizable register-transfer level VHDL, and shows how these transformations and other optimizing synthesis and compiler techniques are employed by a scheduling heuristic.
Abstract: This paper presents a modular and extensible high-level synthesis research system, called SPARK, that takes a behavioral description in ANSI-C as input and produces synthesizable register-transfer level VHDL. SPARK uses parallelizing compiler technology, developed previously, to enhance instruction-level parallelism and re-instruments it for high-level synthesis by incorporating ideas of mutual exclusivity of operations, resource sharing and hardware cost models. In this paper, we present the design flow through the SPARK system, a set of transformations that include speculative code motions and dynamic transformations and show how these transformations and other optimizing synthesis and compiler techniques are employed by a scheduling heuristic. Experiments are performed on two moderately complex industrial applications, namely MPEG-1 and the GIMP image processing tool. The results show that the various code transformations lead to up to 70 % improvements in performance without any increase in the overall area and critical path of the final synthesized design.

424 citations

Proceedings ArticleDOI
03 Jan 2001
TL;DR: An overview of the key technologies required for low-energy distributed microsensors include power aware computation/communication component technology, low- energy signaling and networking, system partitioning based on computation and communication tradeoffs, and a power aware software infrastructure is presented.
Abstract: Wireless distributed microsensor systems will enable fault tolerant monitoring and control of a variety of applications. Due to the large number of microsensor nodes that may be deployed and the need for long system lifetimes, replacing the battery is not an option. Sensor systems must utilize the minimal possible energy while operating over a wide range of operating scenarios. This paper presents an overview of the key technologies required for low-energy distributed microsensors. These include power aware computation/communication component technology, low-energy signaling and networking, system partitioning based on computation and communication tradeoffs, and a power aware software infrastructure.

423 citations

Proceedings ArticleDOI
02 Jan 2011
TL;DR: A novel multiplier architecture with tunable error characteristics, that leverages a modified inaccurate 2x2 building block, that can achieve 2X - 8X better Signal-Noise-Ratio (SNR) for the same power savings when compared to recent voltage over-scaling based power-error tradeoff methods is proposed.
Abstract: We propose a novel multiplier architecture with tunable error characteristics, that leverages a modified inaccurate 2x2 building block. Our inaccurate multipliers achieve an average power saving of 31.78% ? 45.4% over corresponding accurate multiplier designs, for an average error of 1.39%?3.32%. Using image filtering and JPEG compression as sample applications we show that our architecture can achieve 2X - 8X better Signal-Noise-Ratio (SNR) for the same power savings when compared to recent voltage over-scaling based power-error tradeoff methods. We project the multiplier power savings to bigger designs highlighting the fact that the benefits are strongly design dependent. We compare this circuit-centric approach to power quality tradeoffs with a pure software adaptation approach for a JPEG example. We also enhance the design to allow for correct operation of the multiplier using a residual adder, for non error resilient applications.

411 citations

Proceedings ArticleDOI
05 Jan 2004
TL;DR: This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems.
Abstract: Security is a concern in the design of a wide range of embedded systems. Extensive research has been devoted to the development of cryptographic algorithms that provide the theoretical underpinnings of information security. Functional security mechanisms, such as security protocols, suitably employ these mathematical primitives in order to achieve the desired security objectives. However, functional security mechanisms alone cannot ensure security, since most embedded systems present attackers with an abundance of opportunities to observe or interfere with their implementation, and hence to compromise their theoretical strength. This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems. Tamper-resistant design refers to the process of designing a system architecture and implementation that is resistant to such attacks. We outline approaches that have been proposed to design tamper-resistant embedded systems, with examples drawn from recent commercial products.

245 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
202373
202256
202147
202039
2019106
201889