Source code transformation to improve conditional hardware reuse

被引:1
|
作者
Peñalba, O [1 ]
Mendías, JM [1 ]
Hermida, R [1 ]
机构
[1] Univ Complutense Madrid, Dpto Arquitectura Computadores & Automat, Madrid 28040, Spain
关键词
D O I
10.1109/DSD.2002.1115385
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The computations of a system whose behavior varies depending on the value of some conditions may present a property called mutual exclusiveness. This property, responsible for the degree of conditional reuse achievable after a high-level synthesis (HLS) process, is intrinsic to the behavior. But sometimes it is only partially reflected in the actual description written by a designer, leading to worse implementations. Our algorithm explores in an efficient manner the real mutual exclusiveness of the behavior, independently of the description style. It performs a transformation of the input description that allows the HLS tools to obtain better circuits in terms of the area saving due to conditional reuse.
引用
收藏
页码:324 / 330
页数:7
相关论文
共 50 条
  • [31] Automatic source code generation of peripheral hardware modules firmware
    Krunic, Momcilo
    Letvencuk, Ivan
    Povazan, Ivan
    Stanojlovic, Ivana
    [J]. 2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 833 - +
  • [32] Hardware-assisted fine-grained code-reuse attack detection
    20155201716533
    [J]. (1) State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China; (2) Department of Computer Science and Technology, Nanjing University, Nanjing, China; (3) School of Information Systems, Singapore Management University, Singapore, Singapore, 1600, Asterisk Research, Inc.; Deloitte Tohmatsu Risk Services Co., Ltd.; Farsight Security, Inc.; NTT Communications Corporation; Tapad Inc. (Springer Verlag):
  • [33] Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
    An, Zhenliang
    Wang, Weike
    Li, Wenxin
    Li, Senyang
    Zhang, Dexue
    [J]. MICROMACHINES, 2023, 14 (08)
  • [34] On the adoption and effects of source code reuse on defect proneness and maintenance effort
    Giammaria Giordano
    Gerardo Festa
    Gemma Catolino
    Fabio Palomba
    Filomena Ferrucci
    Carmine Gravino
    [J]. Empirical Software Engineering, 2024, 29
  • [35] The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
    Reid, David
    Jahanshahi, Mahmoud
    Mockus, Audris
    [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 2104 - 2115
  • [36] On the adoption and effects of source code reuse on defect proneness and maintenance effort
    Giordano, Giammaria
    Festa, Gerardo
    Catolino, Gemma
    Palomba, Fabio
    Ferrucci, Filomena
    Gravino, Carmine
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2024, 29 (01)
  • [37] Reusable Execution Replay: Execution Record and Replay for Source Code Reuse
    Armaly, Ameer
    Ferris, Casey
    McMillan, Collin
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 480 - 483
  • [38] Extraction of Library Update History Using Source Code Reuse Detection
    Jewmaidang, Kanyakorn
    Ishio, Takashi
    Ihara, Akinori
    Matsumoto, Kenichi
    Leelaprute, Pattara
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 799 - 802
  • [39] Uncovering Source Code Reuse in Large-Scale Academic Environments
    Flores, Enrique
    Barron-Cedeno, Alberto
    Moreno, Lidia
    Rosso, Paolo
    [J]. COMPUTER APPLICATIONS IN ENGINEERING EDUCATION, 2015, 23 (03) : 383 - 390
  • [40] Source Code Reuse Evaluation by Using Real/Potential Copy and Paste
    Ohta, Takafumi
    Murakami, Hiroaki
    Igaki, Hiroshi
    Higo, Yoshiki
    Kusumoto, Shinji
    [J]. 2015 IEEE 9TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2015, : 33 - 39