Extracting Vectors from Application Traces for Power Integrity Analysis

被引:0
|
作者
Olsson, Martin [1 ]
Pihl, Johnny [1 ]
Andersson, Daniel [1 ]
Larsson-Edefors, Per [2 ]
机构
[1] Atmel Norway AS, Vestre Rosten 79, N-7075 Tiller, Norway
[2] Chalmers, Dept CSE, S-41296 Gothenburg, Sweden
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present an approach to power integrity analysis that is based on traces resulting from application execution. The first phase of the approach identifies a vector that maximally stresses the power grid, while the second phase entails simulation of the selected vector on an accurate grid model. We show, for an AVR32 32-bit microcontroller, that the vector we identify gives rise to a supply voltage drop that is 18% larger than that of the vector obtained in a regular flow, which considers average power dissipation per cycle.
引用
收藏
页码:39 / 42
页数:4
相关论文
共 50 条
  • [1] Extracting Application Objects from TCP Packet Traces
    Alcock, Shane
    Lawson, Daniel
    Nelson, Richard
    [J]. 2007 AUSTRALASIANTELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE, 2007, : 108 - 113
  • [2] EXTRACTING CLOUD MOTION VECTORS FROM SATELLITE IMAGES FOR SOLAR POWER FORECASTING
    Cros, S.
    Liandrat, O.
    Sebastien, N.
    Schmutz, N.
    [J]. 2014 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2014, : 4123 - +
  • [3] EXTRACTING VECTORS FROM RASTER IMAGES
    PARKER, JR
    [J]. COMPUTERS & GRAPHICS, 1988, 12 (01) : 75 - 79
  • [4] Extracting a mobility model from real user traces
    Kim, Minkyong
    Kotz, David
    Kim, Songkuk
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 1035 - +
  • [5] Signal and Power Integrity Analysis of InFO Interconnect for Networking Application
    Chang, Po-Hao
    Hsieh, Chia-Yuan
    Chang, Chun-Wei
    Chung, Chih-Lun
    Chiang, Chen-Feng
    [J]. 2018 IEEE 68TH ELECTRONIC COMPONENTS AND TECHNOLOGY CONFERENCE (ECTC 2018), 2018, : 1720 - 1725
  • [6] LSI noise model for power integrity analysis and its application
    Sato, T
    Hashimoto, T
    Sasagawa, R
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2006, 42 (02): : 266 - 273
  • [7] Power vectors: An application of Fourier analysis to the description and statistical analysis of refractive error
    Thibos, LN
    Wheeler, W
    Horner, D
    [J]. OPTOMETRY AND VISION SCIENCE, 1997, 74 (06) : 367 - 375
  • [8] Signal Integrity Analysis of Serpentine Traces in IC Packages
    Datta, Ashwini Datta Narahari
    Bandyopadhyay, Tapobrata
    Sinha, Snehamay
    [J]. 2016 IEEE DALLAS CIRCUITS AND SYSTEMS CONFERENCE (DCAS), 2016,
  • [9] Extracting Customer Traces from CRMS: From Software to Process Models
    Osman, Cristina-Claudia
    Ghiran, Ana-Maria
    [J]. 12TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2018), 2019, 32 : 619 - 626
  • [10] Extracting Data Manipulation Processes from SQL Execution Traces
    Mori, Marco
    Noughi, Nesrine
    Cleve, Anthony
    [J]. INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 85 - 101