scispace - formally typeset
Search or ask a question
Book•

Computational Aspects of Vlsi

01 Jan 1984-
About: The article was published on 1984-01-01 and is currently open access. It has received 862 citations till now. The article focuses on the topics: Very-large-scale integration.
Citations
More filters
Proceedings Article•DOI•
01 Jun 1985
TL;DR: The historical background and the major developments in the field of compaction are reviewed, emphasizing subjective evaluations rather than objective descriptions.
Abstract: Compaction is the CAD tool used to pack rough sketches or symbolic diagrams to produce IC layouts. Manual compaction is tedious, time-consuming, and error-prone; automated compaction tools can greatly shorten the layout design cycle. This paper reviews the historical background and the major developments in the field of compaction, emphasizing subjective evaluations rather than objective descriptions. The major approaches covered are constraint-graph, shear-line, and virtual-grid. Various ideas for further reducing chip area (such as inserting jog points, shortening wires, dense packing, 2-D compaction, and interactive tools) are also discussed. Because of the critical role of efficient algorithms in VLSI CAD systems, analyses of computational complexities are also included.

20 citations

Book Chapter•DOI•
01 Nov 1992
TL;DR: An efficient approach to partitioning unstructured meshes that occur naturally in the finite element and finite difference methods that makes use of the underlying geometric structure of a given mesh and finds a provably good partition in random O(n) time is described.
Abstract: This paper describes an efficient approach to partitioning unstructured meshes that occur naturally in the finite element and finite difference methods. The approach makes use of the underlying geometric structure of a given mesh and finds a provably good partition in random O(n) time. It applies to meshes in both two and three dimensions. The new method has applications in efficient sequential and parallel algorithms for large-scale problems in scientific computing. This is an overview paper written with emphasis on the algorithmic aspects of the approach. Many detailed proofs can be found in companion papers.

20 citations

Book Chapter•DOI•
Sergey Pupyrev1•
25 Sep 2017
TL;DR: This work disproves the conjecture that every planar graph admits a mixed mixed layout in which every edge is assigned to a stack or to a queue that use a common vertex ordering, and provides a planargraph that does not have such a mixed layout.
Abstract: A k-stack (respectively, k-queue) layout of a graph consists of a total order of the vertices, and a partition of the edges into k sets of non-crossing (non-nested) edges with respect to the vertex ordering. In 1992, Heath and Rosenberg conjectured that every planar graph admits a mixed 1-stack 1-queue layout in which every edge is assigned to a stack or to a queue that use a common vertex ordering.

20 citations


Cites background from "Computational Aspects of Vlsi"

  • ...Another closely related concept is a (non-ordered) concentric representation of a planar graph [12,16]....

    [...]

Journal Article•DOI•
TL;DR: The unidirectional flow of control and data in the design assures implementation of the linear array in the known fault models of Wafer Scale Integration.

20 citations

Journal Article•DOI•
02 Apr 2015-Sensors
TL;DR: The proposed new selective encryption method exploits the error propagation property in an H.264 decoder and improves the collective performance by analyzing the tradeoff between the visual security level and the processing speed compared to typical selective encryption methods.
Abstract: In transmitting video data securely over Video Sensor Networks (VSNs), since mobile handheld devices have limited resources in terms of processor clock speed and battery size, it is necessary to develop an efficient method to encrypt video data to meet the increasing demand for secure connections. Selective encryption methods can reduce the amount of computation needed while satisfying high-level security requirements. This is achieved by selecting an important part of the video data and encrypting it. In this paper, to ensure format compliance and security, we propose a special encryption method for H.264, which encrypts only the DC/ACs of I-macroblocks and the motion vectors of P-macroblocks. In particular, the proposed new selective encryption method exploits the error propagation property in an H.264 decoder and improves the collective performance by analyzing the tradeoff between the visual security level and the processing speed compared to typical selective encryption methods (i.e., I-frame, P-frame encryption, and combined I-/P-frame encryption). Experimental results show that the proposed method can significantly reduce the encryption workload without any significant degradation of visual security.

20 citations