US20100293421A1 - Low depth programmable priority encoders - Google Patents
Low depth programmable priority encoders Download PDFInfo
- Publication number
- US20100293421A1 US20100293421A1 US12/465,810 US46581009A US2010293421A1 US 20100293421 A1 US20100293421 A1 US 20100293421A1 US 46581009 A US46581009 A US 46581009A US 2010293421 A1 US2010293421 A1 US 2010293421A1
- Authority
- US
- United States
- Prior art keywords
- circuits
- signals
- signal
- response
- enable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/74—Selecting or encoding within a word the position of one or more bits having a specified value, e.g. most or least significant one or zero detection, priority encoders
Definitions
- the present invention relates to priority encoders generally and, more particularly, to a method and/or apparatus for implementing low depth programmable priority encoders.
- Priority encoders are useful logic to determine arbitrated situations that can be used in various applications.
- a priority encoder transfers only a single logical one bit in a highest priority position within an N-bit request signal (i.e., R) to a corresponding position an N-bit output signal (i.e., Z).
- Programmable priority encoders operate as multiple parallel encoders under the control of a priority signal (i.e., P).
- a netlist of a conventional programmable priority encoder (PPE) circuit 20 is shown.
- the circuit 20 uses a ripple carry implementation that creates a long timing path 22 .
- the long path 22 causes a 2N ⁇ 3 Boolean gate delay through the circuitry.
- the circuit 20 has difficulty operating at high clock speeds (i.e., >900 MHz), even for moderate values of N.
- FIG. 2 a netlist of a conventional explanatory technique for a circular programmable priority encoder (CPPE) circuit 30 is shown.
- a path 32 in the circuit 30 forms a closed combinational loop.
- the loop can result in an effectively infinite delay through the circuitry in situations where the values received in the signals R and P cause the loop to oscillate.
- the present invention concerns an apparatus having a plurality of first circuits, second circuits, third circuits and fourth circuits.
- the first circuits may configured to generate a plurality of first signals in response to (i) a priority signal and (ii) a request signal.
- the second circuits may be configured to generate a plurality of second signals in response to the first signals.
- the third circuits may be configured to generate a plurality of enable signals in response to the second signals.
- the fourth circuits may be configured to generate collectively an output signal in response to (i) the enable signals and (ii) the request signal.
- a combination of the first circuits, the second circuits, the third circuits and the fourth circuits generally establishes a programmable priority encoder.
- the second signals may be generated independent of the enable signals.
- the objects, features and advantages of the present invention include providing apparatus for implementing low depth programmable priority encoders that may (i) provide a short propagation delay, (ii) have a low Boolean logic gate count and/or (iii) have a low fanout.
- FIG. 1 is a netlist of a conventional programmable priority encoder (PPE) circuit
- FIG. 2 is a netlist of a conventional explanatory technique for a circular programmable priority encoder (CPPE) circuit
- FIG. 3 is a diagram illustrating an example segmentation operation of a PPE
- FIG. 4 is a block diagram of a functional implementation of a PPE circuit
- FIG. 5 is a diagram of an example transformation of a PPE circuit into a CPPE circuit
- FIG. 6 is a block diagram of an example implementation of an N-bit CPPE circuit
- FIG. 7 a block diagram of a functional implementation of a CPPE circuit
- FIGS. 8A-8D are diagrams of shortcut notations
- FIG. 9 is a block diagram of the circuit shown in FIG. 8 using the shortcut notations.
- FIG. 10 is a block diagram of an example implementation of a PPE circuit implemented by a binary architecture
- FIG. 11 is a block diagram of an example implementation of a PPE circuit implemented by a Fibonacci architecture
- FIG. 12 is a block diagram of an example implementation of a PPE circuit implemented by a mixed approach architecture
- FIG. 13 is a block diagram of an example implementation of a CPPE circuit implemented by the binary architecture
- FIG. 14 is a block diagram of an example implementation of a CPPE circuit implemented by the Fibonacci architecture.
- FIG. 15 is a block diagram of an example implementation of a CPPE circuit implemented by the mixed architecture.
- Embodiments of the present invention generally describe fast (e.g., low depth) implementations of non-circular programmable priority encoders and circular programmable priority encoders.
- Each of the implementations may provide a short propagation delay and have a moderate gate count.
- Some of the embodiments may be implemented as, but are not limited to, hardware-only designs.
- a (non-circular) PPE generally has two inputs: a request signal (e.g., R) having N bits and a priority signal (e.g., P) having N bits.
- the PPE generally generates an output signal (e.g., Z), also having N bits.
- the N-bit PPE may be denoted as PPE N or PPE(N) or PPE_N.
- Generation of the signal Z in response to the signal R and the signal P may be as follows.
- the priority bits of the signal P may specify partitioning of a set of request bits ⁇ 0 , 1 , . . .
- N ⁇ 1 ⁇ of the signal R into pieces or subsets.
- a single asserted (e.g., logical one) request bit of the signal R within each of the pieces may be transferred to the same bit-position in the signal Z.
- the active (e.g., logical one) priority bits at indices 10, 6 and 3 generally establish subsets or segments covering indices 9 to 6, 5 to 3 and 2 to 0 respectively.
- the indices 12 to 10 are not covered by any active priority bits and thus the corresponding bits in the signal Z are generated deasserted (e.g., logical zero) regardless of associated bits in the signal R.
- the notations “&” may represent a Boolean AND operation, “
- the input bits R[N ⁇ 1] and P[0], and the output bit Z[N ⁇ 1] may be dummy bits.
- the dummy bits are generally used in the above text for the uniformity with the following description of a circular programmable priority encoder (CPPE).
- a CPPE generally has the two inputs: the signal R and the signal P.
- the CPPE may generate the output signal Z.
- the N-bit CPPE may be denoted as CPPE N or CPPE(N) or CPPE_N.
- the functionality of the CPPE is generally similar to the above-described functionality of the PPE, with a modification.
- the modification may establish that an initial value of the variable ENABLE matches a final value. To avoid looping, notice that given values of the signal R and the signal P may establish at most three behaviors in a transformation of ENABLE OLD to ENABLE NEW :
- behavior (iii) may occur in a single case: when all bits of both signals R and P are zero. In such a case, all of the bits in the output signal Z may also be zero for any initial value of ENABLE. Thus, the “for” loop mentioned above for the PPE may be repeated twice: the first iteration generally initializes the variable ENABLE and the second iteration may actually compute output values in the signal Z.
- the following notations may be applied:
- a complexity may be denoted by a complexity parameter (e.g., LF).
- LPPE may represent a complexity of a PPE.
- the complexity LF may identify a gate count in terms of Boolean 2-input AND logic gates and Boolean 2-input OR logic gates. Boolean NOT logic gates may be considered as “free” and thus generally do not contribute to the complexity LF.
- a depth may be denoted by depth parameter (e.g., DF).
- depth parameter e.g., DF
- DPPE may represent a depth of a PPE.
- the depth DF may establish a number of logic levels, also in terms of the Boolean 2-input AND logic gates and the Boolean 2-input OR logic gates. Boolean NOT logic gates may again be considered “free” and thus generally do not contribute to the depth DF.
- a function F N (T[N ⁇ 1], . . . , T[0]), where N may be an even number, is generally defined as follows:
- the function F N may also be written as F(N) or F_N.
- Embodiments of the present invention generally produce low-depth implementations of a programmable priority encoder (PPE) and/or a circular programmable priority encoder (CPPE) based on efficient circuit implementations of the function F N .
- PPE programmable priority encoder
- CPPE circular programmable priority encoder
- the circuit 100 generally comprises a circuit 102 , multiple circuits 104 a - 104 n and multiple circuits 106 a - 106 n .
- the circuit 102 may receive the signal R.
- An inverted signal (e.g., ⁇ R) may be generated by the circuit 102 .
- Each of the circuits 104 a - 104 n may receive appropriate parts of the signal P and the signal ⁇ R.
- the individual components of the signal E may be generated by the circuits 104 a - 104 n and routed to a respective one of the circuits 106 a - 106 n .
- the circuits 106 a - 106 n may also receive the signal R.
- the signal Z may be collectively generated by the circuits 106 a - 106 n by concatenating the individual bits generated by the circuits 106 a - 106 n.
- the circuit 102 generally comprises an N-bit wide inverter.
- Each of the circuits 106 a - 106 n generally comprises a 2-input AND logic gate. One of the logic gates may receive a respective bit of the signal E. The other logic gate may receive a respective bit of the signal R.
- a combination of the N 1-bit output signals generated by the circuits 106 a - 106 n may be grouped to form the signal Z.
- Each of the circuit 104 a - 104 n may implement a respective function F 2N ⁇ 2 , F 2N ⁇ 4 , . . . , F 0 using different combinations of bits from the signal P and the signal ⁇ R.
- the circuit 100 may be implemented with a depth DPPE N ⁇ 1+DF 2N ⁇ 2 and a gate count LPPE N ⁇ N+LF 0 +LF 2 +LF 4 + . . . +LF 2 N 2 .
- the gate count LPPE N may be reduced if the circuits 104 a - 104 n can share common parts.
- a CPPE may be implemented in multiple ways.
- a diagram of an example transformation of a PPE circuit 120 into a CPPE circuit 110 is shown.
- the N-bit circuit 110 may be implemented via the 2N-bit circuit 120 .
- Half of the circuit 120 may be used to calculate the variable ENABLE and the other half may be used to calculate the signal Z.
- the notation “ ⁇ A, B, C, . . . ⁇ ” generally denotes concatenation of the individual signals A, B, C, . . .
- X[i:j] may represent a signal extracted from the i th bit to the j th bit of a bus X, that is X[i:j] is a shortcut for concatenation ⁇ X[i], . . . , X[j] ⁇ .
- the bits are generally indexed in a descending order, that is i>j).
- the circuit 180 may be based on the transformation shown in FIG. 5 , applied to a PPE shown in FIG. 1 .
- the circuit 180 generally comprises multiple (e.g., N) inverters 182 a - 182 n , multiple (e.g., 3N) 2-input AND logic gates 184 a - 184 n , 186 a - 186 n , 188 a - 188 n and multiple (e.g., 2N) 2-input OR logic gates 190 a - 190 n , 192 a - 192 n .
- the circuit 180 generally has a depth of 4N+1 logic gate levels and utilizes 5N of the 2-input logic gates.
- Another implementation approach is generally based on the cyclical structure of the function of a CPPE N as follows:
- the circuit 130 generally comprises a circuit 132 , multiple circuits 134 a - 134 n and multiple circuits 136 a - 136 n .
- the circuit 132 may receive the signal R.
- the inverted signal ⁇ R may be generated by the circuit 132 .
- Each of the circuits 134 a - 134 n may receive the signal P and the signal ⁇ R.
- a component of the signal ENABLE may be generated by the circuits 134 a - 134 n and routed to a respective one of the circuit 136 - 136 n .
- the circuits 136 a - 136 n may also receive the signal R.
- the signal Z may be generated by the circuits 136 a - 136 n .
- the gate count LCPPE N may be reduced if N circuits for the (2N ⁇ 2)-input functions F (with different inputs) can share common parts.
- the circuit 132 generally comprises an N-bit wide inverter.
- Each of the circuits 136 a - 136 n generally comprises a 2-input AND logic gate. One of the inputs of each AND gate may receive a respective bit of the signal E. The other input of the AND gate may receive a respective bit of the signal R.
- a combination of the N1-bit output signals generated by the circuits 136 a - 136 n may be grouped to form the signal Z.
- Each of the circuit 134 a - 134 n may implement the function F 2N ⁇ 2 using different combinations of bits from the signal P and the signal ⁇ R.
- Shortcut notations may be used to represent PPE/CPPE circuit designs.
- the circuit 180 of FIG. 6 may be redrawn as FIG. 9 using the notations.
- FIGS. 8A-8D diagrams of shortcut notations useful to represent particular implementations of a PPE and/or a CPPE are shown.
- a triangle shortcut notation may represent a “preparation” step.
- Each of the triangles may represent a circuit 140 generally comprising an inverter logic gate 142 and multiple feed-through paths 144 and 146 .
- the gate 142 may invert a corresponding bit (e.g., R[i]) of the signal R to generate a corresponding bit (e.g., B 0 [i]) of the signal ⁇ R.
- the feed-through 144 may present a bit (e.g., P[i]) of the signal P as an output bit (e.g., A 0 [i]).
- the feed-through 146 may present the bit R[i] as an output bit.
- the vertical outgoing arrow below the triangle may represent a 2-bit bus ⁇ A 0 [i], B 0 [i] ⁇ .
- the diagonal arrow nearest the vertical arrow may represent the signal R[i].
- the other diagonal arrow (where present) may also represent the 2-bit bus ⁇ A 0 [i], B 0 [i] ⁇ .
- the signals presented by the circuits 140 may be referred to as first signals.
- the bits A N [i] may also be written as A[N] [i] or A_N[i].
- a N may be written as A(N) or A_N.
- the bits B N [i] may be written as B[N] [i] or B_N[i].
- B N may be written as B(N) or B_N.
- a shaded square notation may represent the above-described operation T implemented by a circuit 150 .
- Each of the circuits 150 generally comprises a circuit 152 , a circuit 154 and a circuit 156 .
- Each of the circuits 150 generally receives multiple (e.g., 4) binary inputs and generates multiple (e.g., 2) binary outputs.
- all incoming/outgoing arrows connected to the circuit may represent 2-bit busses with bits named A and B.
- Each of the outputs may have a typical fanout of 2.
- the circuit 152 may be implemented as a 2-input AND logic gate.
- the circuit 154 may be implemented as another 2-input AND logic gate.
- the circuit 156 may be implemented as a 2-input OR logic gate.
- the gate 152 may generate an input bit to the gate 156 by performing a logical AND of an input bit (e.g., B N [i]) and an input bit (e.g., A N [j]).
- the gate 154 may generate an output bit (e.g., B N+1 [i]) by performing a logical AND of the input bit B N [i] and an input bit (e.g., B N [j]).
- the gate 156 may generate an output bit (e.g., A N+1 [i]) by performing a logical OR of an input bit (e.g., A N [i]) and the input bit received from the gate 152 .
- the vertical arrow below the shaded square may represent a 2-bit bus ⁇ A N+1 [i], B N+1 ⁇ i] ⁇ .
- the diagonal arrow below the shaded square may also represent the 2-bit bus ⁇ A N+1 [i], B N+1 ⁇ i] ⁇ .
- the signals produced by the circuits 150 may be referred to as second signals.
- a white square notation may represent a reduced variant of T implemented by a circuit 160 , where only a leftmost output bit (e.g., x1
- Each of the circuits 160 generally comprises a gate 162 and a gate 166 .
- the gates 162 and 166 may be connected in the same fashion as the gates 152 and 156 in the circuit 150 .
- the gate 162 may generate an input bit to the gate 166 by performing a logical AND of an input bit (e.g., B N [i]) and an input bit (e.g., A N [j]).
- the gate 166 may generate and output bit (e.g., A N [i]) by performing a logical OR of the input bit A N [i] and the input bit received from the gate 162 .
- the vertical arrow below the white square may represent a 1-bit signal A N+1 [i].
- an AND gate notation may represent a 2-input AND logic gate 170 .
- the output bit Z[i] may be generated by performing a logical AND of the input bit R[i] and the input bit A N [j].
- the vertical arrow below the gate may represent a 1-bit signal Z[i].
- the signals presented by the circuits 170 may be referred to as the output signal Z.
- the inverters 182 a - 182 n may be presented in a first layer 193 a by the triangle notation.
- the gates 184 a - 184 n and 190 a - 190 n may be represented in a second layer 194 a by the white square notation.
- the gates 186 a - 186 n and 192 a - 192 n may be represented in a third layer 196 a by the white square notation.
- the gates 188 a - 188 n may be represented in a fourth layer 198 a by the AND gate notation.
- Embodiments of the present invention may implement the PPE and the CPPE circuitry based on (i) a “binary” Kogge-Stone approach, (ii) a “Fibonacci” method of Gashkov et al. and (iii) combinations of the two approaches.
- the Kogge-Stone approach is generally described in “A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations”, by Peter M. Kogge and Harold S. Stone, IEEE Transaction on Computers, 1973, C-22, pp. 783-791, which is hereby incorporated by reference.
- the Gashkov et al. approach is generally described in U.S. Pat. No. 6,934,733, which is hereby incorporated by reference.
- the two methods are generally based on translations of AND-OR-chains in binary logic into a special associative operation of a quaternary logic.
- the property of associativeness generally enables chained calculations to be reorganized into trees, thus reducing the depth without increment of gate count.
- the associativeness of T may be proven directly as follows:
- T ( Y,Z ) ⁇ y 1
- T ( X,T ( Y,Z )) ⁇ x 1
- T(T(X,Y),Z) T(X,T(Y,Z)). Therefore, operation T is associative.
- computing of the T-chains may be used to compute the function F N .
- a given circuit designed according to the “binary” approach may have the following parts: an initialization step; a series of “duplication” steps; and a final (“masking”) step.
- Each of the steps generally has a low depth (e.g., 1-2 logic levels).
- the steps may be sequentially connected in a chain with the following exception: in some embodiments, a portion of the inputs to the last step may be received directly from the initialization steps.
- the initialization step may be included as follows:
- the value added to i is doubled each time and the process may stop when the sum 1+2+4+8+ . . . of the values becomes greater than N ⁇ 3.
- the number of steps is approximately log 2 N.
- the values A k [i+1] generated by the last duplication step generally form an enable mask in the signal E to be combined with input components R[i] of the signal R in the last (masking) step to create the signal Z.
- Each of the components Z[i] of the signal Z may be defined as follows:
- FIG. 10 a block diagram of an example implementation of a PPE circuit 200 is shown in accordance with a preferred embodiment of the present invention.
- the circuit 200 is generally represented by multiple triangle notations in a first layer 193 b , multiple shaded square notations in a second layer 194 b , multiple white square notations in a third layer 196 b and multiple AND gate notations in a fourth layer 198 b.
- the last operator T may be such that only the output A is utilized in further computations (e.g., parts of the mask signal E).
- the computations may be re-partitioned in 4 layers, where all computations units in each individual layer may be identical.
- the first layer 193 b may implement the initialization step using the NOT gates.
- the second layer 194 b generally covers most circuitry of the duplication steps, namely, all of the operators T such that both outputs are utilized.
- the third layer 196 b may cover the rest of the duplication circuitry, including “simplified” version of T (e.g., containing only the computation of the function t1).
- the fourth layer 198 b generally implements the masking step using the AND gates.
- the circuit 200 generally has a stop condition of 1+2+4+8+ . . . ⁇ N ⁇ 3. Under the stop condition, signals from the last (N ⁇ 1) th input (e.g., R[25]) may reach the 0 th output (e.g., Z[0]).
- the binary approach generally comprises about 3N log 2 N two-input logic gates and produces a circuit depth of about 2 log 2 N logic gate levels.
- a “Fibonacci” approach may be used to reduce the depth of a PPE.
- the depth reduction is generally based on the following observation on the operation T: in T( ⁇ x1,y1 ⁇ , ⁇ x2,y2 ⁇ ), input x1 may arrive one logic level later than all other inputs without affecting the output delay.
- the Fibonacci approach may be expressed as a number of computational steps, where the intermediate values may also be named via A and B.
- ⁇ A 0 [i], B 0 [i] ⁇ and ⁇ A 1 [i], B 1 [i] ⁇ may be defined in the same way as used above (e.g., the circuit starts with the same initialization step and the first duplication step as under the binary approach).
- the remaining computations may differ, because “Fibonacci” steps may be used instead of the “duplication” steps, namely:
- the process may stops when the sum 1+2+3+5+8+ . . . of the values becomes greater than N ⁇ 3.
- the number of steps may yield approximately 1.44 log 2 N logic gate levels.
- the values A k [i+1] of the last Fibonacci step generally form the enable mask (e.g., signal E) to be combined with the signal R in the last (masking) step, the same way as in the binary method:
- the circuit 210 is generally represented by multiple triangle notations in a first layer 193 c , multiple shaded square notations in a second layer 194 c , multiple white square notations in a third layer 196 c and multiple AND gate notations in a fourth layer 198 c .
- the layers may be defined in a similar fashion as for the binary method and thus have referral indices similar to FIG. 10 .
- the Fibonacci approach generally has about 4.32N log 2 N two-input logic gates.
- the Fibonacci approach may produce circuit depths of about 1.44 log 2 N logic gate levels.
- the Fibonacci approach generally has fewer gate levels (and thus may produce faster circuits) than the binary approach in trade for larger circuits (e.g., containing more logic gate and wires) than the binary approach.
- a mixed approach may be used to reduce the size of a PPE. For certain values of N, the total number of gates may be reduced over the Fibonacci approach while maintaining the same depth.
- the mixed approach generally combines “duplication” steps of the form T( ⁇ A[i], B[i] ⁇ , ⁇ A[i+C], B[i+C] ⁇ ) and the Fibonacci steps T( ⁇ A[i], B[i] ⁇ , ⁇ A′[i+C], B′[i+C] ⁇ ), where the two groups of inputs may be taken from two different steps.
- the circuit 220 is generally represented by multiple triangle notations in a first layer 193 d , multiple shaded square notations in a second layer 194 d , multiple white square notations in a third layer 196 d and multiple AND gate notations in a fourth layer 198 d.
- the illustration generally includes two duplication steps.
- ⁇ A 0 [i], B 0 [i] ⁇ , ⁇ A 1 [i], B 1 [i] ⁇ and ⁇ A 2 [i], B 2 [i] ⁇ may be defined in the same way as in the binary approach.
- the Fibonacci steps may be used as follows:
- a description sequence S[0] . . . S[k] may be introduced, where the number S[j] is generally defined such that ⁇ A j [i], B j [i] ⁇ depends only on primary inputs P[t], R[t] for i ⁇ t ⁇ i+S[j].
- a choice between the different implementations of a PPE may be made under one or both of a size criteria and a timing criteria specified by a customer.
- the above approaches may be applied to a binary CPPE generally in the same way as the binary PPE.
- the cyclical nature of a CPPE may be used in the steps for ⁇ A 1 [i], B 1 [i] ⁇ , ⁇ A 2 [i], B 2 [i] ⁇ etc., and in the last step to compute Z[i].
- the binary approach generally includes an initialization step of:
- the value added to i may be doubled each time, and the process generally stops when the sum 1+2+4+8+ . . . of the values becomes greater than N ⁇ 2. As such, the number of steps is approximately log 2 N.
- the values A k [i+1] generated by the last stage may be the enable mask (e.g., the signal E) to be combined with inputs R[i]:
- the circuit 230 is generally represented by multiple triangle notations in a first layer 193 e , multiple shaded square notations in a second layer 194 e , multiple white square notations in a third layer 196 e and multiple AND gate notations in a fourth layer 198 e.
- the circuit 230 generally has a stop condition of 1+2+4+8+ . . . ⁇ N ⁇ 2. Under the stop condition, signals from each pair of inputs may reach each output.
- the binary approach may utilize about 3N log 2 N two-input gates and produces circuits of depth about 2 log 2 N logic gate levels.
- CPPEs may be “heavier” than PPEs for the same input size N and for the same particular variant of implementation, but the difference may be negligible where N is large.
- the Fibonacci approach may be applied to a CPPE.
- ⁇ A 0 [i], B 0 [i] ⁇ and ⁇ A 1 [i], B,[i] ⁇ may be defined in the same way as above for the Fibonacci PPE.
- the Fibonacci CPPE computations may be as follows:
- the process generally stops when the sum 1+2+3+5+8+ . . . of the values becomes greater than N ⁇ 2.
- the number of steps may be approximately 1.44 log 2 N.
- the values A k [i+1] generated by the last stage may form the enable mask (e.g., the signal E) to be combined with inputs R[i] in the same way as in the binary method:
- the mixed approach may also be applied to a CPPE.
- Application of the mixed approach to a CPPE may be the same as a PPE.
- the duplication steps of the form T( ⁇ A[i], B[i] ⁇ , ⁇ A[i+C], B[i+C] ⁇ ) and Fibonacci steps T( ⁇ A[i], B[i] ⁇ , ⁇ A′[i+C], B′[i+C] ⁇ ) may be combined where the two groups of inputs are taken from two different steps.
- FIG. 15 a block diagram of an example implementation of a CPPE circuit 250 is shown.
- the example generally shows two duplication steps. In particular, ⁇ A 0 [i], B 0 [i] ⁇ , ⁇ A 1 [i], B 1 [i] ⁇ and ⁇ A 2 [i], B 2 [i] ⁇ may be defined in the same way as in the pure binary method.
- the following Fibonacci steps may also be used:
- S[k] may be introduced, where the number S[j] is generally defined such that ⁇ A j [i], B j [i] ⁇ may depend only on the primary inputs P[t], R[t] for i ⁇ t ⁇ i+S[j].
- a choice between the different implementations of CPPE may be made under one or both of a size criteria and a timing criteria specified by a customer.
- FIGS. 4 and 7 - 15 may be implemented using one or more of a conventional general purpose processor, digital computer, microprocessor, microcontroller, RISC (reduced instruction set computer) processor, CISC (complex instruction set computer) processor, SIMD (single instruction multiple data) processor, signal processor, central processing unit (CPU), arithmetic logic unit (ALU), video digital signal processor (VDSP) and/or similar computational machines, programmed according to the teachings of the present specification, as will be apparent to those skilled in the relevant art(s).
- RISC reduced instruction set computer
- CISC complex instruction set computer
- SIMD single instruction multiple data
- signal processor central processing unit
- CPU central processing unit
- ALU arithmetic logic unit
- VDSP video digital signal processor
- the present invention may also be implemented by the preparation of ASICs (application specific integrated circuits), Platform ASICs, FPGAs (field programmable gate arrays), PLDs (programmable logic devices), CPLDs (complex programmable logic device), sea-of-gates, RFICs (radio frequency integrated circuits), ASSPs (application specific standard products) or by interconnecting an appropriate network of conventional component circuits, as is described herein, modifications of which will be readily apparent to those skilled in the art(s).
- ASICs application specific integrated circuits
- FPGAs field programmable gate arrays
- PLDs programmable logic devices
- CPLDs complex programmable logic device
- sea-of-gates RFICs (radio frequency integrated circuits)
- ASSPs application specific standard products
- the present invention thus may also include a computer product which may be a storage medium or media and/or a transmission medium or media including instructions which may be used to program a machine to perform one or more processes or methods in accordance with the present invention.
- a computer product which may be a storage medium or media and/or a transmission medium or media including instructions which may be used to program a machine to perform one or more processes or methods in accordance with the present invention.
- Execution of instructions contained in the computer product by the machine, along with operations of surrounding circuitry may transform input data into one or more files on the storage medium and/or one or more output signals representative of a physical object or substance, such as an audio and/or visual depiction.
- the storage medium may include, but is not limited to, any type of disk including floppy disk, hard drive, magnetic disk, optical disk, CD-ROM, DVD and magneto-optical disks and circuits such as ROMs (read-only memories), RAMs (random access memories), EPROMs (electronically programmable ROMs), EEPROMs (electronically erasable ROMs), UVPROM (ultra-violet erasable ROMs), Flash memory, magnetic cards, optical cards, and/or any type of media suitable for storing electronic instructions.
- ROMs read-only memories
- RAMs random access memories
- EPROMs electroly programmable ROMs
- EEPROMs electro-erasable ROMs
- UVPROM ultra-violet erasable ROMs
- Flash memory magnetic cards, optical cards, and/or any type of media suitable for storing electronic instructions.
- the elements of the invention may form part or all of one or more devices, units, components, systems, machines and/or apparatuses.
- the devices may include, but are not limited to, servers, workstations, storage array controllers, storage systems, personal computers, laptop computers, notebook computers, palm computers, personal digital assistants, portable electronic devices, battery powered devices, set-top boxes, encoders, decoders, transcoders, compressors, decompressors, pre-processors, post-processors, transmitters, receivers, transceivers, cipher circuits, cellular telephones, digital cameras, positioning and/or navigation systems, medical equipment, heads-up displays, wireless devices, audio recording, storage and/or playback devices, video recording, storage and/or playback devices, game platforms, peripherals and/or multi-chip modules.
- Those skilled in the relevant art(s) would understand that the elements of the invention may be implemented in other types of devices to meet the criteria of a particular application.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Logic Circuits (AREA)
Abstract
Description
- The present invention relates to priority encoders generally and, more particularly, to a method and/or apparatus for implementing low depth programmable priority encoders.
- Priority encoders are useful logic to determine arbitrated situations that can be used in various applications. A priority encoder transfers only a single logical one bit in a highest priority position within an N-bit request signal (i.e., R) to a corresponding position an N-bit output signal (i.e., Z). Programmable priority encoders operate as multiple parallel encoders under the control of a priority signal (i.e., P).
- Referring to
FIG. 1 , a netlist of a conventional programmable priority encoder (PPE)circuit 20 is shown. Thecircuit 20 uses a ripple carry implementation that creates along timing path 22. For an N-bit signal R, thelong path 22 causes a 2N−3 Boolean gate delay through the circuitry. Hence, thecircuit 20 has difficulty operating at high clock speeds (i.e., >900 MHz), even for moderate values of N. - Referring to
FIG. 2 , a netlist of a conventional explanatory technique for a circular programmable priority encoder (CPPE)circuit 30 is shown. Apath 32 in thecircuit 30 forms a closed combinational loop. The loop can result in an effectively infinite delay through the circuitry in situations where the values received in the signals R and P cause the loop to oscillate. - It would be desirable to implement a programmable priority encoder and a circular programmable priority encoder without the
path 22 or thepath 32. - The present invention concerns an apparatus having a plurality of first circuits, second circuits, third circuits and fourth circuits. The first circuits may configured to generate a plurality of first signals in response to (i) a priority signal and (ii) a request signal. The second circuits may be configured to generate a plurality of second signals in response to the first signals. The third circuits may be configured to generate a plurality of enable signals in response to the second signals. The fourth circuits may be configured to generate collectively an output signal in response to (i) the enable signals and (ii) the request signal. A combination of the first circuits, the second circuits, the third circuits and the fourth circuits generally establishes a programmable priority encoder. The second signals may be generated independent of the enable signals.
- The objects, features and advantages of the present invention include providing apparatus for implementing low depth programmable priority encoders that may (i) provide a short propagation delay, (ii) have a low Boolean logic gate count and/or (iii) have a low fanout.
- These and other objects, features and advantages of the present invention will be apparent from the following detailed description and the appended claims and drawings in which:
-
FIG. 1 is a netlist of a conventional programmable priority encoder (PPE) circuit; -
FIG. 2 is a netlist of a conventional explanatory technique for a circular programmable priority encoder (CPPE) circuit; -
FIG. 3 is a diagram illustrating an example segmentation operation of a PPE; -
FIG. 4 is a block diagram of a functional implementation of a PPE circuit; -
FIG. 5 is a diagram of an example transformation of a PPE circuit into a CPPE circuit; -
FIG. 6 is a block diagram of an example implementation of an N-bit CPPE circuit; -
FIG. 7 a block diagram of a functional implementation of a CPPE circuit; -
FIGS. 8A-8D are diagrams of shortcut notations; -
FIG. 9 is a block diagram of the circuit shown inFIG. 8 using the shortcut notations; -
FIG. 10 is a block diagram of an example implementation of a PPE circuit implemented by a binary architecture; -
FIG. 11 is a block diagram of an example implementation of a PPE circuit implemented by a Fibonacci architecture; -
FIG. 12 is a block diagram of an example implementation of a PPE circuit implemented by a mixed approach architecture; -
FIG. 13 is a block diagram of an example implementation of a CPPE circuit implemented by the binary architecture; -
FIG. 14 is a block diagram of an example implementation of a CPPE circuit implemented by the Fibonacci architecture; and -
FIG. 15 is a block diagram of an example implementation of a CPPE circuit implemented by the mixed architecture. - Embodiments of the present invention generally describe fast (e.g., low depth) implementations of non-circular programmable priority encoders and circular programmable priority encoders. Example implementations are generally shown either for a general case of N-bit input/output signals or for a particular case of N=26 bits. In the second case however, other bit-sizes may be implemented to meet the criteria of a particular application. Each of the implementations may provide a short propagation delay and have a moderate gate count. Some of the embodiments may be implemented as, but are not limited to, hardware-only designs.
- Referring to
FIG. 3 , a diagram illustrating an example segmentation operation of a programmable priority encoder (PPE) is shown. A (non-circular) PPE generally has two inputs: a request signal (e.g., R) having N bits and a priority signal (e.g., P) having N bits. The PPE generally generates an output signal (e.g., Z), also having N bits. The N-bit PPE may be denoted as PPEN or PPE(N) or PPE_N. Generation of the signal Z in response to the signal R and the signal P may be as follows. The priority bits of the signal P may specify partitioning of a set of request bits {0, 1, . . . , N−1} of the signal R into pieces or subsets. A single asserted (e.g., logical one) request bit of the signal R within each of the pieces (e.g., the request bit in a higher priority position within the respective piece, if multiple request bits exist) may be transferred to the same bit-position in the signal Z. For example, moving left-to-right, the active (e.g., logical one) priority bits at 10, 6 and 3 generally establish subsets orindices segments covering indices 9 to 6, 5 to 3 and 2 to 0 respectively. Theindices 12 to 10 are not covered by any active priority bits and thus the corresponding bits in the signal Z are generated deasserted (e.g., logical zero) regardless of associated bits in the signal R. - The above operation may be described as a scanning process with an internal 1-bit variable (e.g., ENABLE) as follows:
-
ENABLE = 0; for(i = N−1; i ≧ 0; i−−) { Z[i] = R[i] & ENABLE; ENABLE = (~R[i] & ENABLE) | P[i]; } - The notations “&” may represent a Boolean AND operation, “|” may represent a Boolean OR operation, “˜” may represent a Boolean NOT operation and X[i] may represent the ith bit of a multi-bit signal X. The input bits R[N−1] and P[0], and the output bit Z[N−1] may be dummy bits. The dummy bits are generally used in the above text for the uniformity with the following description of a circular programmable priority encoder (CPPE).
- A CPPE generally has the two inputs: the signal R and the signal P. The CPPE may generate the output signal Z. The N-bit CPPE may be denoted as CPPEN or CPPE(N) or CPPE_N. The functionality of the CPPE is generally similar to the above-described functionality of the PPE, with a modification. The modification may establish that an initial value of the variable ENABLE matches a final value. To avoid looping, notice that given values of the signal R and the signal P may establish at most three behaviors in a transformation of ENABLEOLD to ENABLENEW:
- (i) ENABLENEW=0
- (ii) ENABLENEW=1
- (iii) ENABLENEW=ENABLEOLD
- Notice that behavior (iii) may occur in a single case: when all bits of both signals R and P are zero. In such a case, all of the bits in the output signal Z may also be zero for any initial value of ENABLE. Thus, the “for” loop mentioned above for the PPE may be repeated twice: the first iteration generally initializes the variable ENABLE and the second iteration may actually compute output values in the signal Z.
- The above operation may be described as a scanning process as follows:
-
ENABLE = 0; for(i = N−1; i ≧ 0; i−−) { ENABLE = (~R[i] & ENABLE) | P[i]; } for(i = N−1; i ≧ 0; i−−) { Z[i] = R[i] & ENABLE; ENABLE = (~R[i] & ENABLE) | P[i]; }
The following notations may be applied: - For a function/operator/circuit F, a complexity may be denoted by a complexity parameter (e.g., LF). For example, LPPE may represent a complexity of a PPE. The complexity LF may identify a gate count in terms of Boolean 2-input AND logic gates and Boolean 2-input OR logic gates. Boolean NOT logic gates may be considered as “free” and thus generally do not contribute to the complexity LF.
- For the function/operator/circuit F, a depth may be denoted by depth parameter (e.g., DF). For example, DPPE may represent a depth of a PPE. The depth DF may establish a number of logic levels, also in terms of the Boolean 2-input AND logic gates and the Boolean 2-input OR logic gates. Boolean NOT logic gates may again be considered “free” and thus generally do not contribute to the depth DF.
- A function FN(T[N−1], . . . , T[0]), where N may be an even number, is generally defined as follows:
-
F N =T[N−1]|(T[N−2]&(T[N−3]|(T[N−4]&( . . . (T[2]& T[1]) . . . )))), - where the value T[0] may be omitted and F0=0.
- The function FN may also be written as F(N) or F_N.
- Embodiments of the present invention generally produce low-depth implementations of a programmable priority encoder (PPE) and/or a circular programmable priority encoder (CPPE) based on efficient circuit implementations of the function FN. A PPE may be expressed via the function FN as follows:
-
Z[i]=R[i]&ENABLE[i],i=0 . . . N−1, -
- where ENABLE[N−1−i]=F2i(P[N−i], ˜R[N−i], P[N−i+1], ˜R[N−i+2], . . . , P[N−1], ˜R[N−1])
- Referring to
FIG. 4 , a block diagram of a functional implementation of aPPE circuit 100 is shown. Thecircuit 100 generally comprises acircuit 102, multiple circuits 104 a-104 n and multiple circuits 106 a-106 n. Thecircuit 102 may receive the signal R. An inverted signal (e.g., ˜R) may be generated by thecircuit 102. Each of the circuits 104 a-104 n may receive appropriate parts of the signal P and the signal ˜R. An enable signal (e.g., E) may comprise multiple variables ENABLE (e.g., ENABLE[i]=E[i], for i=0 . . . N−1). The individual components of the signal E may be generated by the circuits 104 a-104 n and routed to a respective one of the circuits 106 a-106 n. The circuits 106 a-106 n may also receive the signal R. The signal Z may be collectively generated by the circuits 106 a-106 n by concatenating the individual bits generated by the circuits 106 a-106 n. - The
circuit 102 generally comprises an N-bit wide inverter. Each of the circuits 106 a-106 n generally comprises a 2-input AND logic gate. One of the logic gates may receive a respective bit of the signal E. The other logic gate may receive a respective bit of the signal R. A combination of the N 1-bit output signals generated by the circuits 106 a-106 n may be grouped to form the signal Z. Each of the circuit 104 a-104 n may implement a respective function F2N−2, F2N−4, . . . , F0 using different combinations of bits from the signal P and the signal ˜R. - Given an implementation of a function Fk corresponding to each of the circuits 104 a-104 n, the circuits 104 a-104 n may have a respective depth DFk and a respective gate count LFk, where k=0, 2, 4, . . . , 2N−2. When the circuits 104 a-104 n are combined, the
circuit 100 may be implemented with a depth DPPEN≦1+DF2N−2 and a gate count LPPEN≦N+LF0+LF2+LF4+ . . . +LF2N2. The gate count LPPEN may be reduced if the circuits 104 a-104 n can share common parts. - Generally, a CPPE may be implemented in multiple ways.
- Referring to
FIG. 5 , a diagram of an example transformation of aPPE circuit 120 into aCPPE circuit 110 is shown. Based on the definitions provided above, the N-bit circuit 110 may be implemented via the 2N-bit circuit 120. Half of thecircuit 120 may be used to calculate the variable ENABLE and the other half may be used to calculate the signal Z. For example, Z[N−1:0] CPPE(P[N−1:0], R[N−1:0]) may be replaced by {Dummy[N−1:0], Z[N−1:0]}=PPE({P[N−1:0], P[N−1:0]}, {R[N−1:0], R[N−1:0]}), where the “Dummy” bus is introduced just to explicitly provide a bit-to-bit correspondence in the assignment; the “Dummy” bus is generally not used elsewhere. (In the text, the notation “{A, B, C, . . . }” generally denotes concatenation of the individual signals A, B, C, . . . into a common bus, and “X[i:j]” may represent a signal extracted from the ith bit to the jth bit of a bus X, that is X[i:j] is a shortcut for concatenation {X[i], . . . , X[j]}. In the text, the bits are generally indexed in a descending order, that is i>j). Hence, the depth DCPPEN≦DPPE2N≦1+DF4N−2 and the gate count LCPPEN≦LPPE2N≦2N+LF0+LF2+LF4+ . . . +LF4N−2. - Referring to
FIG. 6 , a block diagram of an example implementation of an N-bit CPPE circuit 180 is shown. Thecircuit 180 may be based on the transformation shown inFIG. 5 , applied to a PPE shown inFIG. 1 . Thecircuit 180 generally comprises multiple (e.g., N) inverters 182 a-182 n, multiple (e.g., 3N) 2-input AND logic gates 184 a-184 n, 186 a-186 n, 188 a-188 n and multiple (e.g., 2N) 2-input OR logic gates 190 a-190 n, 192 a-192 n. Thecircuit 180 generally has a depth of 4N+1 logic gate levels and utilizes 5N of the 2-input logic gates. - Another implementation approach is generally based on the cyclical structure of the function of a CPPEN as follows:
-
Z[i]=R[i]&ENABLE[i],i=0 . . . N−1, -
- where ENABLE[i]=F2i(P[i%N], ˜R[i%N],P[(i+1)%N], ˜R[(i+1)%N], . . . , P[(i+N−1)%N], ˜R[(i+N−1)%N])
Notation “x%y” generally represents a modulus operation, that is the remainder after an integer division x/y. The above expansion generally gives a depth DCPPEN≦1+DF2N−2 and a gate count LCPPEN≦N+N LF2N−2.
- where ENABLE[i]=F2i(P[i%N], ˜R[i%N],P[(i+1)%N], ˜R[(i+1)%N], . . . , P[(i+N−1)%N], ˜R[(i+N−1)%N])
- Referring to
FIG. 7 , a block diagram of a functional implementation of aCPPE circuit 130 is shown. Thecircuit 130 generally comprises acircuit 132, multiple circuits 134 a-134 n and multiple circuits 136 a-136 n. Thecircuit 132 may receive the signal R. The inverted signal ˜R may be generated by thecircuit 132. Each of the circuits 134 a-134 n may receive the signal P and the signal ˜R. A component of the signal ENABLE may be generated by the circuits 134 a-134 n and routed to a respective one of the circuit 136-136 n. The circuits 136 a-136 n may also receive the signal R. The signal Z may be generated by the circuits 136 a-136 n. The gate count LCPPEN may be reduced if N circuits for the (2N−2)-input functions F (with different inputs) can share common parts. - The
circuit 132 generally comprises an N-bit wide inverter. Each of the circuits 136 a-136 n generally comprises a 2-input AND logic gate. One of the inputs of each AND gate may receive a respective bit of the signal E. The other input of the AND gate may receive a respective bit of the signal R. A combination of the N1-bit output signals generated by the circuits 136 a-136 n may be grouped to form the signal Z. Each of the circuit 134 a-134 n may implement the function F2N−2 using different combinations of bits from the signal P and the signal ˜R. - Shortcut notations (e.g.,
FIGS. 8A-8D ) may be used to represent PPE/CPPE circuit designs. As an illustrative example, thecircuit 180 ofFIG. 6 may be redrawn asFIG. 9 using the notations. Referring toFIGS. 8A-8D , diagrams of shortcut notations useful to represent particular implementations of a PPE and/or a CPPE are shown. InFIG. 8A , a triangle shortcut notation may represent a “preparation” step. Each of the triangles may represent acircuit 140 generally comprising aninverter logic gate 142 and multiple feed-throughpaths 144 and 146. In the ith circuit 140, thegate 142 may invert a corresponding bit (e.g., R[i]) of the signal R to generate a corresponding bit (e.g., B0[i]) of the signal ˜R. The feed-through 144 may present a bit (e.g., P[i]) of the signal P as an output bit (e.g., A0[i]). The feed-through 146 may present the bit R[i] as an output bit. - The vertical outgoing arrow below the triangle may represent a 2-bit bus {A0[i], B0[i]}. The diagonal arrow nearest the vertical arrow may represent the signal R[i]. The other diagonal arrow (where present) may also represent the 2-bit bus {A0[i], B0[i]}. Individually and/or collectively, the signals presented by the
circuits 140 may be referred to as first signals. Generally, the bits AN[i] may also be written as A[N] [i] or A_N[i]. Likewise, AN may be written as A(N) or A_N. The bits BN[i] may be written as B[N] [i] or B_N[i]. In a similar manner, BN may be written as B(N) or B_N. - In
FIG. 8B , a shaded square notation may represent the above-described operation T implemented by acircuit 150. Each of thecircuits 150 generally comprises acircuit 152, acircuit 154 and acircuit 156. Each of thecircuits 150 generally receives multiple (e.g., 4) binary inputs and generates multiple (e.g., 2) binary outputs. In the shortcut notation, all incoming/outgoing arrows connected to the circuit may represent 2-bit busses with bits named A and B. Each of the outputs may have a typical fanout of 2. - The
circuit 152 may be implemented as a 2-input AND logic gate. Thecircuit 154 may be implemented as another 2-input AND logic gate. Thecircuit 156 may be implemented as a 2-input OR logic gate. In the ith circuit 150, thegate 152 may generate an input bit to thegate 156 by performing a logical AND of an input bit (e.g., BN[i]) and an input bit (e.g., AN[j]). Thegate 154 may generate an output bit (e.g., BN+1[i]) by performing a logical AND of the input bit BN[i] and an input bit (e.g., BN[j]). Thegate 156 may generate an output bit (e.g., AN+1[i]) by performing a logical OR of an input bit (e.g., AN[i]) and the input bit received from thegate 152. The vertical arrow below the shaded square may represent a 2-bit bus {AN+1[i], BN+1{i]}. The diagonal arrow below the shaded square may also represent the 2-bit bus {AN+1[i], BN+1{i]}. Individually and/or collectively, the signals produced by thecircuits 150 may be referred to as second signals. - In
FIG. 8C , a white square notation may represent a reduced variant of T implemented by acircuit 160, where only a leftmost output bit (e.g., x1|x2&y1) may be generated. Each of thecircuits 160 generally comprises a gate 162 and agate 166. Thegates 162 and 166 may be connected in the same fashion as the 152 and 156 in thegates circuit 150. In the ith circuit 160, the gate 162 may generate an input bit to thegate 166 by performing a logical AND of an input bit (e.g., BN[i]) and an input bit (e.g., AN[j]). Thegate 166 may generate and output bit (e.g., AN[i]) by performing a logical OR of the input bit AN[i] and the input bit received from the gate 162. The vertical arrow below the white square may represent a 1-bit signal AN+1[i]. Individually and/or collectively, the signals presented by thecircuits 160 may be referred to as the enable signal E (e.g., E[k]=A(N+1)[i], where k=(i+N−1)%N). - In
FIG. 8D , an AND gate notation may represent a 2-input ANDlogic gate 170. In the ith gate 170, the output bit Z[i] may be generated by performing a logical AND of the input bit R[i] and the input bit AN[j]. The input bit AN[j] is generally the component E[i] of the signal E, where i=(j+1)%N. The vertical arrow below the gate may represent a 1-bit signal Z[i]. Individually and/or collectively, the signals presented by thecircuits 170 may be referred to as the output signal Z. - Referring to
FIG. 9 , a block diagram of thecircuit 180 using the shortcut notations is shown. The inverters 182 a-182 n may be presented in a first layer 193 a by the triangle notation. The gates 184 a-184 n and 190 a-190 n may be represented in asecond layer 194 a by the white square notation. The gates 186 a-186 n and 192 a-192 n may be represented in athird layer 196 a by the white square notation. The gates 188 a-188 n may be represented in afourth layer 198 a by the AND gate notation. - Embodiments of the present invention may implement the PPE and the CPPE circuitry based on (i) a “binary” Kogge-Stone approach, (ii) a “Fibonacci” method of Gashkov et al. and (iii) combinations of the two approaches. The Kogge-Stone approach is generally described in “A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations”, by Peter M. Kogge and Harold S. Stone, IEEE Transaction on Computers, 1973, C-22, pp. 783-791, which is hereby incorporated by reference. The Gashkov et al. approach is generally described in U.S. Pat. No. 6,934,733, which is hereby incorporated by reference.
- The two methods are generally based on translations of AND-OR-chains in binary logic into a special associative operation of a quaternary logic. The property of associativeness generally enables chained calculations to be reorganized into trees, thus reducing the depth without increment of gate count. Consider the four values of a quaternary logic to be represented as pairs of binary values: {0, 0}, {0, 1}, {1, 0}, {1, 1}. Furthermore, let an operation T(X, Y) where T={t1,t2}, X={x1,x2}, Y={y1,y2} (which may be treated as a 2-input operation over the quaternary logic, or as a pair (t1,t2) of 4-input functions over the standard binary Boolean logic, with inputs x1, y1, x2, y2) be given as follows:
-
t1=x1|x2&y1 -
t2=x2&y2 - The associativeness of T may be proven directly as follows:
-
- and
-
T(Y,Z)={y1|y2&z1,y2&z2} -
T(X,T(Y,Z))={x1|y1&(y1|y2&z1),x2&y2&z2} - thus T(T(X,Y),Z)=T(X,T(Y,Z)). Therefore, operation T is associative.
- For any even number N, the chain T({A[N−1], A[N−2]}, T({A[N−3], A[N−4]}, . . . , T(A[1], A[0]) . . . ))) generally computes a pair {t1,t2}, where t1=FN(t[N−1], . . . , t[0]), and t2=t[N−2] & t[N−4] & . . . & t[0]. As such, computing of the T-chains may be used to compute the function FN.
- A given circuit designed according to the “binary” approach may have the following parts: an initialization step; a series of “duplication” steps; and a final (“masking”) step. Each of the steps generally has a low depth (e.g., 1-2 logic levels). The steps may be sequentially connected in a chain with the following exception: in some embodiments, a portion of the inputs to the last step may be received directly from the initialization steps.
- In the “binary” approach to an N-bit PPE, the initialization step may be included as follows:
- {A0[i], B0[i]}={P[i], ˜R[i]}, i=0 . . . N−1
- and about k=log2 N “duplication” steps as follows:
- {A1[i], B1[i]} is:
-
- if i+1≧N, then {A0[i], B0[i]}
- else T({A0[i], B0[i]}, {A0[i+1], B0[i+1]})
- {A2[i], B2[i]} is:
-
- if i+2≧N, then {A1[i], B1[i]}
- else T({A1[i], B1[i]}, {A1[i+2], B1[i+2]})
- {A3[i], B3[i]} is:
-
- if i+4≧N, then {A2[i], B2[i]}
- else T({A2[i], B2[i]}, {A2[i+4], B2[i+4]})
- {A4[i], B4[i]} is:
-
- if i+8≧N, then {A3[i], B3[i]}
- else T({A3[i], B3[i]}, {A3[i+8], B3[i+8]})
- . . .
- Generally, the value added to i is doubled each time and the process may stop when the
sum 1+2+4+8+ . . . of the values becomes greater than N−3. As such, the number of steps is approximately log2 N. - The values Ak[i+1] generated by the last duplication step generally form an enable mask in the signal E to be combined with input components R[i] of the signal R in the last (masking) step to create the signal Z. Each of the components Z[i] of the signal Z may be defined as follows:
-
- if i+1≧N then Z[i]=0
- else Z[i]=Ak[i+1] & R[i]
- Referring to
FIG. 10 , a block diagram of an example implementation of aPPE circuit 200 is shown in accordance with a preferred embodiment of the present invention. Thecircuit 200 generally implements the above binary architecture and illustrates an example input size of 26 bits (e.g., N=26). Other input sizes may be implemented to meet the criteria of a particular application. Thecircuit 200 is generally represented by multiple triangle notations in afirst layer 193 b, multiple shaded square notations in asecond layer 194 b, multiple white square notations in athird layer 196 b and multiple AND gate notations in afourth layer 198 b. - Note that not all of the operators T in the duplication steps may be arranged such that both output are in use: for each bit line i, the last operator T may be such that only the output A is utilized in further computations (e.g., parts of the mask signal E). Thus, the computations may be re-partitioned in 4 layers, where all computations units in each individual layer may be identical. For example, the
first layer 193 b may implement the initialization step using the NOT gates. Thesecond layer 194 b generally covers most circuitry of the duplication steps, namely, all of the operators T such that both outputs are utilized. Thethird layer 196 b may cover the rest of the duplication circuitry, including “simplified” version of T (e.g., containing only the computation of the function t1). Thefourth layer 198 b generally implements the masking step using the AND gates. - The
circuit 200 generally has a stop condition of 1+2+4+8+ . . .≧N− 3. Under the stop condition, signals from the last (N−1)th input (e.g., R[25]) may reach the 0th output (e.g., Z[0]). For large values of N, the binary approach generally comprises about 3N log2 N two-input logic gates and produces a circuit depth of about 2 log2 N logic gate levels. - A “Fibonacci” approach may be used to reduce the depth of a PPE. The depth reduction is generally based on the following observation on the operation T: in T({x1,y1},{x2,y2}), input x1 may arrive one logic level later than all other inputs without affecting the output delay. The Fibonacci approach may be expressed as a number of computational steps, where the intermediate values may also be named via A and B. In particular, {A0[i], B0[i]} and {A1[i], B1[i]} (note that the variables may be indexed as “1st” and “0th”) may be defined in the same way as used above (e.g., the circuit starts with the same initialization step and the first duplication step as under the binary approach). The remaining computations may differ, because “Fibonacci” steps may be used instead of the “duplication” steps, namely:
- {A2[i], B2[i]} is:
-
- if i+2≧N, then {A1[i], B1[i]}
- else T({A1[i], B1[i]}, {A0[i+2], B0[i+2]})
- {A3[i], B3[i]} is:
-
- if i+3≧N, then {A2[i], B2[i]}
- else T({A2[i], B2[i]}, {A1[i+3], B1[i+3]})
- {A4[i], B4[i]} is:
-
- if i+5≧N, then {A3[i], B3[i]}
- else T({A3[i], B3[i]}, {A2[i+5], B2[i+5]})
- {A5[i], B5[i]} is:
-
- if i+8≧N, then {A4[i], B4[i]}
- else T({A4[i], B4[i]}, {A3[i+8], B3[i+8]})
- . . .
- The value added to i is generally taken from the
1, 2, 3, 5, 8 . . . , where each element of the sequence may be the sum of the two previous elements: 1+2=3, 2+3=5, 3+5=8 etc. The process may stops when theclassical Fibonacci sequence sum 1+2+3+5+8+ . . . of the values becomes greater than N−3. The number of steps may yield approximately 1.44 log2 N logic gate levels. - The values Ak[i+1] of the last Fibonacci step generally form the enable mask (e.g., signal E) to be combined with the signal R in the last (masking) step, the same way as in the binary method:
- z[i] is:
-
- if i+1≧N then 0
- else Ak[i+1] & R[i]
- Referring to
FIG. 11 , a block diagram of an example implementation of aPPE circuit 210 is shown. Thecircuit 210 generally implements the Fibonacci architecture and illustrates an example input size of 26 bits (e.g., N=26). Other input sizes may be implemented to meet the criteria of a particular application. Thecircuit 210 is generally represented by multiple triangle notations in afirst layer 193 c, multiple shaded square notations in asecond layer 194 c, multiple white square notations in athird layer 196 c and multiple AND gate notations in afourth layer 198 c. The layers may be defined in a similar fashion as for the binary method and thus have referral indices similar toFIG. 10 . - For large values of N, the Fibonacci approach generally has about 4.32N log2 N two-input logic gates. The Fibonacci approach may produce circuit depths of about 1.44 log2 N logic gate levels. The Fibonacci approach generally has fewer gate levels (and thus may produce faster circuits) than the binary approach in trade for larger circuits (e.g., containing more logic gate and wires) than the binary approach.
- A mixed approach may be used to reduce the size of a PPE. For certain values of N, the total number of gates may be reduced over the Fibonacci approach while maintaining the same depth. The mixed approach generally combines “duplication” steps of the form T({A[i], B[i]}, {A[i+C], B[i+C]}) and the Fibonacci steps T({A[i], B[i]}, {A′[i+C], B′[i+C]}), where the two groups of inputs may be taken from two different steps.
- Referring to
FIG. 12 , a block diagram of an example implementation of aPPE circuit 220 is shown. Thecircuit 220 generally implements the mixed approach architecture and illustrates an example input size of 26 bits (e.g., N=26). Other input sizes may be implemented to meet the criteria of a particular application. Thecircuit 220 is generally represented by multiple triangle notations in a first layer 193 d, multiple shaded square notations in asecond layer 194 d, multiple white square notations in athird layer 196 d and multiple AND gate notations in a fourth layer 198 d. - The illustration generally includes two duplication steps. In particular, {A0[i], B0[i]}, {A1[i], B1[i]} and {A2[i], B2[i]} may be defined in the same way as in the binary approach. The Fibonacci steps may be used as follows:
- {A3[i], B3[i]} is:
-
- if i+4≧N, then {A2[i], B2[i]}
- else T({A2[i], B2[i]}, {A1[i+4], B1[i+4]})
- {A4[i], B4[i]} is:
-
- if i+6≧N, then {A3[i], B3[i]}
- else T({A3[i], B3[i]}, {A2[i+6], B2[i+6]})
- {A5[i], B1[i]} is:
-
- if i+10≧N, then {A4[i], B4[i]}
- else T({A4[i], B4[i]}, {A3[i+10], B3[i+10]})
- {A6[i], B6[i]} is:
-
- if i+16≧N, then {A5[i], B5[i]}
- else T({A5[i], B5[i]}, {A4[i+16], B4[i+16]})
- Z[i] is:
-
- if i+1≧N then 0
- else A6[i+1] & R[i]
Notice that the “mixed”circuit 220 may have the same depth as the “Fibonacci”circuit 210, but may contain fewer logic gates.
- To formally define the mixed approach, a universal description may be established. Notice that the universal approach generally covers both the binary approach and the Fibonacci approach as two special cases of the mixed approach. Designs of the universal kind may be defined by a sequence of steps in computing {A0[i], B0[i]}, {A1[i], B1[i]}, . . . , {Ak[i], Bk[i]} and finally Z[i], i=0 . . . N, where A0, B0, A1, B1 and Z may always be computed in the same way as shown above. However, the computations for A2, B2 . . . Ak, Bk may vary.
- To describe the possible variants, a description sequence S[0] . . . S[k] may be introduced, where the number S[j] is generally defined such that {Aj[i], Bj[i]} depends only on primary inputs P[t], R[t] for i≦t<i+S[j]. A value of S[0] may be 1, because A0[i] and B0[i] depend only on P[i] and R[i]. If the jth step is a duplication step, then S[j]=2S[j−1] and the step is as follows:
- {Aj[i], Bj[i]} is:
-
- if i+S[j−1]≧N, then {Aj−1[i], Bj−1[i]}
- else T({Aj−1[i], Bj−1[i]}, {Aj−1[i+S[j−1]], Bj−1[i+S[j−1]]})
The above step may have two units of depth. If the jth step is a Fibonacci step, then S[j]=S[j−1]+S[j−2] and the step is as follows:
- {Aj[i], Bj[i]} is:
-
- if i+S[j−1]≧N, then {Aj−1[i], Bj−1[i]}
- else T({Aj−1[i], Bj−1[i]}, {Aj−2[i+S[j−1]], Bj−2[i+S[j−1]]})
The above step may have one unit of depth. The last step should be such that S[k]≧N−2 (otherwise the circuit may not be a PPE). In such terms, all PPE designs under the above architecture may be described via the sequence S[0] . . . S[k].
- Referring again to
FIGS. 10-12 , thecircuit 200 may be described by a first sequence S={1, 2, 4, 8, 16, 32}. The first sequence generally results in 5 duplication steps and a depth of 2×5+1=11 logic gate levels. Thecircuit 210 may be described by a second sequence S={1, 2, 3, 5, 8, 13, 21, 34}. The second sequence may result in 1 duplication step plus 6 Fibonacci steps and a depth of 2+6+1=9 logic gate levels. Thecircuit 220 may be described by a third sequence S={1, 2, 4, 6, 10, 16, 26}. The third sequence may result in 2 duplication steps plus 4 Fibonacci steps and a depth of 2×2+4+1=9 logic gate levels. A choice between the different implementations of a PPE may be made under one or both of a size criteria and a timing criteria specified by a customer. - The above approaches may be applied to a binary CPPE generally in the same way as the binary PPE. The cyclical nature of a CPPE may be used in the steps for {A1[i], B1[i]}, {A2[i], B2[i]} etc., and in the last step to compute Z[i]. Namely, for an N-bit CPPE, the binary approach generally includes an initialization step of:
- {A0[i], B0[i]}={P[i], ˜R[i]}, i=0 . . . N−1
- and k=log2 N duplication steps:
- {A1[i], B1[i]}=T({A0[i], B0[i]}, {A0[i], B0[i]}) where i′=(i+1)%N
- {A2[i], B2[i]}=T({A1[i], B1[i]}, {A1[i′], B1[i′]}) where i′=(i+2)%N
- {A3[i], B3[i]}=T({A2[i], B2[i]}, {A2[i′], B2[i′]}) where i′=(i+4)%N
- {A4[i], B4[i]}=T({A3[i], B3[i]}, {A3[i′], B3[i′]}) where i′=(i+8)%N
- . . .
- The value added to i may be doubled each time, and the process generally stops when the
sum 1+2+4+8+ . . . of the values becomes greater than N−2. As such, the number of steps is approximately log2 N. The values Ak[i+1] generated by the last stage may be the enable mask (e.g., the signal E) to be combined with inputs R[i]: -
Z[i]=Ak[i′]&R[i], -
- where i′=(i+1)%N
- Referring to
FIG. 13 , a block diagram of an example implementation of aCPPE circuit 230 is shown. Thecircuit 230 generally implements the binary architecture and illustrates an example input size of 26 bits (e.g., N=26). Other input sizes may be implemented to meet the criteria of a particular application. Thecircuit 230 is generally represented by multiple triangle notations in afirst layer 193 e, multiple shaded square notations in asecond layer 194 e, multiple white square notations in athird layer 196 e and multiple AND gate notations in a fourth layer 198 e. - The
circuit 230 generally has a stop condition of 1+2+4+8+ . . .≧N− 2. Under the stop condition, signals from each pair of inputs may reach each output. For large values of N, the binary approach may utilize about 3N log2 N two-input gates and produces circuits of depth about 2 log2 N logic gate levels. Generally, such CPPEs may be “heavier” than PPEs for the same input size N and for the same particular variant of implementation, but the difference may be negligible where N is large. - The Fibonacci approach may be applied to a CPPE. In particular, {A0[i], B0[i]} and {A1[i], B,[i]} may be defined in the same way as above for the Fibonacci PPE. The Fibonacci CPPE computations may be as follows:
- {A2[i], B2[i]}=T({A1[i], B1[i]}, {A0[i′], B0[i′]}) where i′=(i+2)%N
- {A3[i], B3[i]}=T({A2[i], B2[i]}, {A1[i′], B1[i′]}) where i′=(i+3)%N
- {A4[i], B4[i]}=T({A3[i], B3[i]}, {A2[i′], B2[i′]}) where i′=(i+5)%N
- {A5[i], B5[i]}=T({A4[i], B4[i]}, {A3[i′], B3[i′]}) where i′=(i+8)%N
- . . .
- The value added to i may be taken from the
1, 2, 3, 5, 8 . . . , where each element of the sequence may be the sum of the two previous elements: 1+2=3, 2+3=5, 3+5=8 etc. The process generally stops when theclassical Fibonacci sequence sum 1+2+3+5+8+ . . . of the values becomes greater than N−2. The number of steps may be approximately 1.44 log2 N. - The values Ak[i+1] generated by the last stage may form the enable mask (e.g., the signal E) to be combined with inputs R[i] in the same way as in the binary method:
-
Z[i]=Ak[i′]&R[i], -
- where i′=(i+1)%N Referring to
FIG. 14 , a block diagram of an example implementation of aCPPE circuit 240 is shown. Thecircuit 240 generally implements the Fibonacci architecture and illustrates an example input size of 26 bits (e.g., N=26). Other input sizes may be implemented to meet the criteria of a particular application. For large values of N, the Fibonacci approach generally has about 4.32N log2 N two-input gates and may produce circuits of a depth of about 1.44 log2 N logic gate levels.
- where i′=(i+1)%N Referring to
- The mixed approach may also be applied to a CPPE. Application of the mixed approach to a CPPE may be the same as a PPE. The duplication steps of the form T({A[i], B[i]}, {A[i+C], B[i+C]}) and Fibonacci steps T({A[i], B[i]}, {A′[i+C], B′[i+C]}) may be combined where the two groups of inputs are taken from two different steps.
- Referring to
FIG. 15 , a block diagram of an example implementation of aCPPE circuit 250 is shown. Thecircuit 250 generally implements the mixed approach architecture and illustrates an example input size of 26 bits (e.g., N=26). Other input sizes may be implemented to meet the criteria of a particular application. The example generally shows two duplication steps. In particular, {A0[i], B0[i]}, {A1[i], B1[i]} and {A2[i], B2[i]} may be defined in the same way as in the pure binary method. The following Fibonacci steps may also be used: - {A3[i] B3[i]}=T({A2[i], B2[i]}, {A1[i′], B1[i′]}) where i′=(i+4)%26
- {A4[i], B4[i]}=T({A3[i], B3[i]}, {A2[i′], B2[i′]}) where i′=(i+6)%26
- {A5[i], B5[i]}=T({A4[i], B4[i]}, {A3[i′], B3[i′]}) where i′=(i+10)%26
- {A6[i], B6[i]}=T({A5[i], B1[i]}, {A4[i′], B4[i′]}) where i′=(i+16)%26
- Z[i]=A6[i] & R[i] where i′=(i+1)%26
- Designs of a universal kind may also be defined for a CPPE by a sequence of steps of computing {A0[i], B0[i]}, {A1[i], B1[i]}, . . . , {Ak[i], Bk[i]} and finally Z[i], i=0 . . . N, where A0, B0, A1, B1 and Z may always be computed in the same way as shown above. However, the computations of A2, B2 . . . Ak, Bk may vary. To describe the possible variants, a description sequence S[S] . . . S[k] may be introduced, where the number S[j] is generally defined such that {Aj[i], Bj[i]} may depend only on the primary inputs P[t], R[t] for i≦t≦i+S[j]. The value S[0] may be 1. If the jth step is a duplication step, then S[j]=2S[j−1] and the step may be:
-
{A j [i],B j [i]}=T({A j−1 [i],B j−1 [i]},{A j−1 [i′],B j−1 [i]}), -
- where i′=(i+S[j−1])%N
The above step may have 2 units of depth. If the jth step is a Fibonacci step, then the sequence S[j]=S[j−1]+S[j−2] and the step may be:
- where i′=(i+S[j−1])%N
-
{A j [i],B j [i]}=T({A j−1 [i],B j−1 [i]},{A j−2 [i′],B j−2 [i′]}), -
- where i′=(i+S[j−1])%N
The above step generally has one unit of depth. The last step should be such that S[k]≧N−1 (otherwise the circuit may not be a CPPE). In such terms, the CPPE designs may be described via the sequence S[0] . . . S[k].
- where i′=(i+S[j−1])%N
- Referring again to
FIGS. 13-15 , thecircuit 230 may be defined by a first sequence S={1, 2, 4, 8, 16, 32}. The first sequence may result in 5 duplication steps and have a depth of 2×5+1=11 logic gate levels. Thecircuit 240 may be defined by a second sequence S={1, 2, 3, 5, 8, 13, 21, 34}. The second sequence may result in 1 duplication step plus 6 Fibonacci steps and a depth of 2+6+1=9 logic gate levels. Thecircuit 250 may be defined by a third sequence S={1, 2, 4, 6, 10, 16, 26}. The third sequence may result in 2 duplication steps plus 4 Fibonacci steps and have a depth of 2×2+4+1=9 logic gate levels. A choice between the different implementations of CPPE may be made under one or both of a size criteria and a timing criteria specified by a customer. - The functions performed by the diagrams of FIGS. 4 and 7-15 may be implemented using one or more of a conventional general purpose processor, digital computer, microprocessor, microcontroller, RISC (reduced instruction set computer) processor, CISC (complex instruction set computer) processor, SIMD (single instruction multiple data) processor, signal processor, central processing unit (CPU), arithmetic logic unit (ALU), video digital signal processor (VDSP) and/or similar computational machines, programmed according to the teachings of the present specification, as will be apparent to those skilled in the relevant art(s). Appropriate software, firmware, coding, routines, instructions, opcodes, microcode, and/or program modules may readily be prepared by skilled programmers based on the teachings of the present disclosure, as will also be apparent to those skilled in the relevant art(s). The software is generally executed from a medium or several media by one or more of the processors of the machine implementation.
- The present invention may also be implemented by the preparation of ASICs (application specific integrated circuits), Platform ASICs, FPGAs (field programmable gate arrays), PLDs (programmable logic devices), CPLDs (complex programmable logic device), sea-of-gates, RFICs (radio frequency integrated circuits), ASSPs (application specific standard products) or by interconnecting an appropriate network of conventional component circuits, as is described herein, modifications of which will be readily apparent to those skilled in the art(s).
- The present invention thus may also include a computer product which may be a storage medium or media and/or a transmission medium or media including instructions which may be used to program a machine to perform one or more processes or methods in accordance with the present invention. Execution of instructions contained in the computer product by the machine, along with operations of surrounding circuitry, may transform input data into one or more files on the storage medium and/or one or more output signals representative of a physical object or substance, such as an audio and/or visual depiction. The storage medium may include, but is not limited to, any type of disk including floppy disk, hard drive, magnetic disk, optical disk, CD-ROM, DVD and magneto-optical disks and circuits such as ROMs (read-only memories), RAMs (random access memories), EPROMs (electronically programmable ROMs), EEPROMs (electronically erasable ROMs), UVPROM (ultra-violet erasable ROMs), Flash memory, magnetic cards, optical cards, and/or any type of media suitable for storing electronic instructions.
- The elements of the invention may form part or all of one or more devices, units, components, systems, machines and/or apparatuses. The devices may include, but are not limited to, servers, workstations, storage array controllers, storage systems, personal computers, laptop computers, notebook computers, palm computers, personal digital assistants, portable electronic devices, battery powered devices, set-top boxes, encoders, decoders, transcoders, compressors, decompressors, pre-processors, post-processors, transmitters, receivers, transceivers, cipher circuits, cellular telephones, digital cameras, positioning and/or navigation systems, medical equipment, heads-up displays, wireless devices, audio recording, storage and/or playback devices, video recording, storage and/or playback devices, game platforms, peripherals and/or multi-chip modules. Those skilled in the relevant art(s) would understand that the elements of the invention may be implemented in other types of devices to meet the criteria of a particular application.
- While the invention has been particularly shown and described with reference to the preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made without departing from the scope of the invention.
Claims (20)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/465,810 US7839164B1 (en) | 2009-05-14 | 2009-05-14 | Low depth programmable priority encoders |
| US12/902,376 US8063659B2 (en) | 2009-05-14 | 2010-10-12 | Low depth programmable priority encoders |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/465,810 US7839164B1 (en) | 2009-05-14 | 2009-05-14 | Low depth programmable priority encoders |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/902,376 Continuation US8063659B2 (en) | 2009-05-14 | 2010-10-12 | Low depth programmable priority encoders |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20100293421A1 true US20100293421A1 (en) | 2010-11-18 |
| US7839164B1 US7839164B1 (en) | 2010-11-23 |
Family
ID=43069484
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/465,810 Active US7839164B1 (en) | 2009-05-14 | 2009-05-14 | Low depth programmable priority encoders |
| US12/902,376 Active US8063659B2 (en) | 2009-05-14 | 2010-10-12 | Low depth programmable priority encoders |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/902,376 Active US8063659B2 (en) | 2009-05-14 | 2010-10-12 | Low depth programmable priority encoders |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US7839164B1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8166441B2 (en) * | 2007-10-12 | 2012-04-24 | Lsi Corporation | Low depth circuit design |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6462694B1 (en) * | 1999-10-25 | 2002-10-08 | International Business Machines Corporation | Priority encoder and encoding method |
| US6934733B1 (en) * | 2001-12-12 | 2005-08-23 | Lsi Logic Corporation | Optimization of adder based circuit architecture |
| US20050216636A1 (en) * | 2004-03-26 | 2005-09-29 | Oki Electric Co., Ltd. | Evaluation chip |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7382794B1 (en) * | 2003-07-24 | 2008-06-03 | Alcatel Lucent | Parallel round-robin arbiter system and method |
-
2009
- 2009-05-14 US US12/465,810 patent/US7839164B1/en active Active
-
2010
- 2010-10-12 US US12/902,376 patent/US8063659B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6462694B1 (en) * | 1999-10-25 | 2002-10-08 | International Business Machines Corporation | Priority encoder and encoding method |
| US6934733B1 (en) * | 2001-12-12 | 2005-08-23 | Lsi Logic Corporation | Optimization of adder based circuit architecture |
| US20050216636A1 (en) * | 2004-03-26 | 2005-09-29 | Oki Electric Co., Ltd. | Evaluation chip |
Also Published As
| Publication number | Publication date |
|---|---|
| US20110029980A1 (en) | 2011-02-03 |
| US8063659B2 (en) | 2011-11-22 |
| US7839164B1 (en) | 2010-11-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11301213B2 (en) | Reduced latency multiplier circuitry for very large numbers | |
| US20250123801A1 (en) | Floating-point decomposition circuitry with dynamic precision | |
| US10873332B2 (en) | Adder circuitry for very large integers | |
| US20230221924A1 (en) | Apparatus and Method for Processing Floating-Point Numbers | |
| Liu et al. | Hikonv: High throughput quantized convolution with novel bit-wise management and computation | |
| US20250224921A1 (en) | Apparatus and Method for Processing Floating-Point Numbers | |
| US7260595B2 (en) | Logic circuit and method for carry and sum generation and method of designing such a logic circuit | |
| US10185545B2 (en) | Trailing or leading zero counter having parallel and combinational logic | |
| US8063659B2 (en) | Low depth programmable priority encoders | |
| US8572150B1 (en) | Parameterization of a CORDIC algorithm for providing a CORDIC engine | |
| US8407277B1 (en) | Full subtractor cell for synthesis of area-efficient subtractor and divider | |
| Blanton et al. | Secure and accurate summation of many floating-point numbers | |
| US5935202A (en) | Compressor circuit in a data processor and method therefor | |
| RU2477513C1 (en) | Homogeneous computing environment cell, homogeneous computing environment and apparatus for pipeline arithmetic calculations on given modulo | |
| US10275391B2 (en) | Combining of several execution units to compute a single wide scalar result | |
| RU2849149C1 (en) | Module for block encryption implementing linear transformation of a data block, and processor containing it | |
| US20250217109A1 (en) | Multiplier with a new Partial Product Generation Method | |
| Hashemian | A new design for high speed and high-density carry select adders | |
| Myjak | A medium-grain reconfigurable architecture for digital signal processing | |
| Schneible et al. | Communication efficient work distributions in stencil operation based applications | |
| US20080177817A1 (en) | Inversion of alternate instruction and/or data bits in a computer | |
| RU2451987C1 (en) | Apparatus for counting index numbers of high bits in data line | |
| KR100403938B1 (en) | High speed (7, 3) Adder for symmetric key cipher | |
| Dave | High-speed Multi Operand Addition Utilizing Flag Bits | |
| Balaprasad et al. | Efficient CSLA Design by Using Modified Logic Formulation Method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: LSI CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GRINCHUK, MIKHAIL;BOLOTOV, ANATOLI;GASHKOV, SERGEY;AND OTHERS;SIGNING DATES FROM 20090429 TO 20090512;REEL/FRAME:022683/0743 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FPAY | Fee payment |
Year of fee payment: 4 |
|
| AS | Assignment |
Owner name: DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:LSI CORPORATION;AGERE SYSTEMS LLC;REEL/FRAME:032856/0031 Effective date: 20140506 Owner name: DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AG Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:LSI CORPORATION;AGERE SYSTEMS LLC;REEL/FRAME:032856/0031 Effective date: 20140506 |
|
| AS | Assignment |
Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LSI CORPORATION;REEL/FRAME:035090/0477 Effective date: 20141114 |
|
| AS | Assignment |
Owner name: LSI CORPORATION, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS AT REEL/FRAME NO. 32856/0031;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:035797/0943 Effective date: 20150420 |
|
| AS | Assignment |
Owner name: LSI CORPORATION, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS (RELEASES RF 032856-0031);ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT;REEL/FRAME:037684/0039 Effective date: 20160201 Owner name: AGERE SYSTEMS LLC, PENNSYLVANIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS (RELEASES RF 032856-0031);ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT;REEL/FRAME:037684/0039 Effective date: 20160201 |
|
| AS | Assignment |
Owner name: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTEL CORPORATION;REEL/FRAME:037733/0440 Effective date: 20160204 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552) Year of fee payment: 8 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |