COMP290-084 Clockless Logic Prof. Montek Singh Jan. 29, 2004.

Slides:



Advertisements
Similar presentations
Hybrid BDD and All-SAT Method for Model Checking Orna Grumberg Joint work with Assaf Schuster and Avi Yadgar Technion – Israel Institute of Technology.
Advertisements

Minimization of Circuits
Lecture 9 Support Vector Machines
Interactive Configuration
Glitches & Hazards.
CSEE 4823 Advanced Logic Design Handout: Lecture #2 1/22/15
Reachability Analysis for AMS Verification using Hybrid Support Function and SMT- based Method Honghuang Lin, Peng Li Dept. of ECE, Texas A&M University.
ECE C03 Lecture 31 Lecture 3 Two-Level Logic Minimization Algorithms Hai Zhou ECE 303 Advanced Digital Design Spring 2002.
بهينه سازي با روش Quine-McCluskey
Two-Level Logic Synthesis -- Heuristic Method (ESPRESSO)
Quine-McClusky Minimization Method Module M4.3 Section 5.3.
1 Consensus Definition Let w, x, y, z be cubes, and a be a variable such that w = ax and y = a’z w = ax and y = a’z Then the cube xz is called the consensus.
Give qualifications of instructors: DAP
EDA (CS286.5b) Day 17 Sequential Logic Synthesis (FSM Optimization)
CS 140 Lecture 3 Professor CK Cheng Tuesday 4/09/02.
Logic Synthesis Outline –Logic Synthesis Problem –Logic Specification –Two-Level Logic Optimization Goal –Understand logic synthesis problem –Understand.
1 Clockless Logic Prof. Montek Singh Feb. 3, 2004.
Asynchronous Interface Specification, Analysis and Synthesis M. Kishinevsky Intel Corporation J. Cortadella Technical University of Catalonia.
Bounded Model Checking EECS 290A Sequential Logic Synthesis and Verification.
Planning Among Movable Obstacles with Artificial Constraints Presented by: Deborah Meduna and Michael Vitus by: Mike Stilman and James Kuffner.
A New Approach to Structural Analysis and Transformation of Networks Alan Mishchenko November 29, 1999.
Sanjit A. Seshia and Randal E. Bryant Computer Science Department
Efficient Reachability Checking using Sequential SAT G. Parthasarathy, M. K. Iyer, K.-T.Cheng, Li. C. Wang Department of ECE University of California –
1 Exact Two-Level Minimization of Hazard-Free Logic with Multiple Input Changes Montek Singh Tue, Oct 16, 2007.
ECE Synthesis & Verification - Lecture 9b 1 ECE 697B (667) Fall 2004 ECE 697B (667) Fall 2004 Synthesis and Verification of Digital Systems Boolean.
Gate Logic: Two Level Canonical Forms
1 State Encoding of Large Asynchronous Controllers Josep Carmona and Jordi Cortadella Universitat Politècnica de Catalunya Barcelona, Spain.
Contemporary Logic Design Two-Level Logic © R.H. Katz Transparency No. 4-1 Chapter #2: Two-Level Combinational Logic Section 2.3, Switches and Tools.
5/6/2004J.-H. R. Jiang1 Functional Dependency for Verification Reduction & Logic Minimization EE290N, Spring 2004.
Exact State Minimization of Non-Deterministic FSMs 290N: The Unknown Component Problem Lecture 17.
ECE 667 Synthesis and Verification of Digital Systems
Computing with Finite Automata (part 2) 290N: The Unknown Component Problem Lecture 10.
CS 151 Digital Systems Design Lecture 32 Hazards
ECE Synthesis & Verification, Lecture 17 1 ECE 697B (667) Spring 2006 ECE 697B (667) Spring 2006 Synthesis and Verification of Digital Systems Technology.
State Minimization and Determinization EECS 290A Sequential Logic Synthesis and Verification.
Overview Part 2 – Circuit Optimization 2-4 Two-Level Optimization
Courtesy RK Brayton (UCB) and A Kuehlmann (Cadence) 1 Logic Synthesis Two-Level Minimization I.
Two Level Logic Optimization. Two-Level Logic Minimization PLA Implementation Ex: F 0 = A + B’C’ F 1 = AC’ + AB F 2 = B’C’ + AB product term AB, AC’,
Courtesy RK Brayton (UCB) and A Kuehlmann (Cadence) 1 Logic Synthesis Two-Level Minimization II.
Quine-McCluskey Computer Organization I 1 March 2010 © McQuain Introduction Recall that the procedure we've seen for forming a Boolean function.
2-Level Minimization Classic Problem in Switching Theory
Department of Computer Engineering
Chapter 3. Minimization of Switching Functions. Given a sw function f(x 1, x 2, …, x n ) and some cost criteria, find a representation of f which minimizes.
Minimization of P-Circuits using Boolean Relations Anna Bernasconi University of Pisa Valentina Ciriani and Gabriella Trucco University of Milano Tiziano.
2-Level Minimization Classic Problem in Switching Theory Tabulation Method Transformed to “Set Covering Problem” “Set Covering Problem” is Intractable.
Two-Level Simplification Approaches Algebraic Simplification: - algorithm/systematic procedure is not always possible - No method for knowing when the.
ICS 252 Introduction to Computer Design Lecture 9 Winter 2004 Eli Bozorgzadeh Computer Science Department-UCI.
Boolean Minimizer FC-Min: Coverage Finding Process Petr Fišer, Hana Kubátová Czech Technical University Department of Computer Science and Engineering.
Two Level Networks. Two-Level Networks Slide 2 SOPs A function has, in general many SOPs Functions can be simplified using Boolean algebra Compare the.
2-1 Introduction Gate Logic: Two-Level Simplification Design Example: Two Bit Comparator Block Diagram and Truth Table A 4-Variable K-map for each of the.
ECE2030 Introduction to Computer Engineering Lecture 8: Quine-McCluskey Method Prof. Hsien-Hsin Sean Lee School of Electrical and Computer Engineering.
1 ECE2030 Introduction to Computer Engineering Lecture 8: Quine-McCluskey Method Prof. Hsien-Hsin Sean Lee School of ECE Georgia Institute of Technology.
Why consider ND-MV networks? Multi-Values: Multi-valued domains can be used to explore larger optimization spaces. Several interesting direct applications.
Curtis A. Nelson 1 Technology Mapping of Timed Circuits Curtis A. Nelson University of Utah September 23, 2002.
Courtesy RK Brayton (UCB) and A Kuehlmann (Cadence) 1 Logic Synthesis Multi-Level Logic Synthesis.
Boolean Functions 1 ECE 667 ECE 667 Synthesis and Verification of Digital Circuits Boolean Functions Basics Maciej Ciesielski Univ.
CALTECH CS137 Winter DeHon CS137: Electronic Design Automation Day 17: March 11, 2002 Sequential Optimization (FSM Encoding)
ICS 252 Introduction to Computer Design Lecture 8- Heuristics for Two-level Logic Synthesis Winter 2005 Eli Bozorgzadeh Computer Science Department-UCI.
Symbolic Model Checking of Software Nishant Sinha with Edmund Clarke, Flavio Lerda, Michael Theobald Carnegie Mellon University.
©2010 Cengage Learning SLIDES FOR CHAPTER 6 QUINE-McCLUSKEY METHOD Click the mouse to move to the next page. Use the ESC key to exit this chapter. This.
Technical Seminar II Implementation of
1 Digital Design Debdeep Mukhopadhyay Associate Professor Dept of Computer Science and Engineering NYU Shanghai and IIT Kharagpur.
Lecture 22 Chapter 9 Sets.
ICS 252 Introduction to Computer Design
Fast Computation of Symmetries in Boolean Functions Alan Mishchenko
Binary Decision Diagrams
Quine-McClusky Minimization Method
Heuristic Minimization of Two Level Circuits
ICS 252 Introduction to Computer Design
Canonical Computation without Canonical Data Structure
Presentation transcript:

COMP Clockless Logic Prof. Montek Singh Jan. 29, 2004

Acknowledgment Michael Theobald and Steven Nowick, for providing slides for this lecture.

An Implicit Method for Hazard-Free Two-Level Logic Minimization Michael Theobald and Steven M. Nowick Columbia University, New York, NY Paper appeared in Async-98 (Best Paper Finalist)

 Hazard-Free Logic Minimization ? Given: Boolean function and multi-input change

Hazard-Free Logic Minimization

Hazard-Free Logic Minimization  f(A)  f(B) 0  0 0  1 1  1 1  0

Hazard-Free 2-Level Logic Minimization

Classic 2-Level Logic Minimization Step 1. Generate Prime Implicants Karnaugh-Map: 1’s: “Minterms” Ovals: “Prime Implicants” Step 2. Select Minimum # of Primes …to cover all Minterms Prime implicants Minterms Quine-McCluskey Algorithm

2-level Logic Minimization: Classic vs. Hazard-Free Classic (Quine-McCluskey): Hazard-Free: –Given: Boolean function & set of “multi-input” changes –Find: min-cost 2-level implementation guaranteed to be glitch-free –Required cubes = sets of minterms –DHF-Prime implicants = maximal implicants that do not intersect privileged cubes illegally

Hazard-Free Logic Minimization Non-monotonic –function hazard –no implementation hazard-free Monotonic –function-hazard-free  Restriction to monotonic changes Multi-Input Changes:

Hazard-Freedom Conditions: 1 -> 1 transition _ 0  _ 0 Required Cube must be covered

Hazard-Freedom Conditions: 1 -> 0 transition

Hazard-Freedom Conditions: 1 -> 0 transition

Hazard-Freedom Conditions: 1 -> 0 transition

Hazard-Freedom Conditions: 1 -> 0 transition

Hazard-Freedom Conditions: 1 -> 0 transition

Hazard-Freedom Conditions: 1 -> 0 transition 

Hazard-Freedom Conditions: 1 -> 0 transition  illegal intersection

Hazard-Freedom Conditions: 1 -> 0 transition No illegal intersection of privileged cube  illegal intersection

Dynamic-Hazard-Free Prime Implicants Prime NO DHF-Prime illegal intersection DHF-Prime

2-level Logic Minimization: Classic vs. Hazard-Free Classic (Quine-McCluskey): Hazard-Free: –Given: Boolean function & set of “multi-input” changes –Find: min-cost 2-level implementation guaranteed to be glitch-free –Required cubes = sets of minterms –DHF-Prime implicants = maximal implicants that do not intersect privileged cubes illegally Main challenge: Computing DHF-prime implicants

Hazard-Free 2-level Logic Minimization: Previous Work Early work (1950s-1970s): –Eichelberger, Unger, Beister, McCluskey Initial solution: Nowick/Dill [ICCAD 1992] Improved approaches: –HFMIN: Fuhrer/Nowick [ICCAD 1995] –Rutten et al. [Async 1999] –Myers/Jacobson [Async 2001] No approach can solve large examples

IMPYMIN: an exact 2-level minimizer Two main ideas: –novel reformulation of hazard-freedom constraints used for dhf-prime generation recasts an asynchronous problem as a synchronous one –uses an “implicit” method represents & manipulates large # of objects simultaneously avoids explicit enumeration makes use of BDDs, ZBDDs Outperforms existing tools by orders of magnitude

Review: Primes vs. DHF-Primes Classic (Quine-McCluskey): Hazard-Free: DHF-Prime Implicants = maximal implicants that do not intersect “privileged cubes” illegally Primes DHF-Primes

Topic 1: New Idea Challenge: Two types of constraints –maximality constraints: “we want maximally large implicants” –avoidance constraints: “we must avoid illegal intersections” DHF-Prime Generation New Approach: Unify constraints by “lifting” the problem into a higher-dimensional space: g(x1, …, xn, z1, …, zl) maximality f(x1,…,xn), T maximality & avoidance constraints

Auxiliary Synchronous Function g z=0z=1 Add one new dimension per privileged cube 0-half-space: g is defined as f 1-half-space: g is defined as f BUT priv-cube is filled with 0’s f g

Prime Implicants of g Expansion in z-dimension guarantees avoidance of priv-cube in original domain f g

Prime Implicants of g Expansion in x-dimension corresponds to enlarging cube in original domain. f g

Summary: Auxiliary Synchronous Function g The definition of auxiliary function g exactly ensures : Expansion in a z-dimension corresponds to avoiding the privileged cube in the original domain. Expansion in a x-dimension corresponds to enlarging the cube in the original domain.

New approach: DHF-Prime Generation Goal: Efficient new method for DHF-Prime generation Approach: –translate original function f into synchronous function g –generate Primes(g) –after filtering step, retrieve dhf-primes(f)

Prime Generation of g f g Prime implicants of g

Filtering Primes of g Filter Lifting Prime implicants of g 3 classes of primes of synchronous fct g: –1. do not intersect priv-cube (in original domain) –2. intersect legally –3. intersect illegally Transforming Prime(g) into DHF-Prime(f,T): f g

Projection Filter Lifting Prime implicants of g f g DHF-Prime(f,T)

Formal Characterization of DHF-Prime(f,T)

IMPYMIN CAD tool for Hazard-Free 2-Level Logic Two main ideas: –Computes DHF-Primes in higher-dimension space –Implicit Method: makes use of BDDs, ZBDDs

What is a BDD ? Compact representation for Boolean function a b c

What is implicit logic minimization? Classic Quine-McCluskey: Scherzo [Coudert] (implicit logic minimization): Prime implicants Minterms  Minterms ZBDD Primes ZBDD  (, )

IMPYMIN Overview: Implicit Hazard-free 2-Level Minimizer f, T Scherzo’s Implicit Solver Req- cubes(f,T) ZBDD f BDD g Prime(g) ZBDD DHF- Prime(f) ZBDD objects-to-be-covered covering objects

Impymin vs. HFMIN: Results #z added variables

IMPYMIN: Conclusions New idea: incorporate hazard-freedom constraints –transformed asynchronous problem into synchronous problem Presented implicit minimizer IMPYMIN: – significantly outperforms existing minimizers Idea may be applicable to other problems, e.g. testing