Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Interval Arithmetic and Self-Similarity Based RTL Input Vector Control for Datapath Leakage Minimization

Published: 16 September 2020 Publication History

Abstract

With technology scaling, subthreshold leakage has dominated the overall power consumption in a design. Input vector control is an effective technique to minimize subthreshold leakage. Low leakage input vector determination is not often possible due to large design space and simulation time. Similarly, applying an appropriate minimum leakage vector (MLV) to each Register Transfer Level (RTL) module instance in a design often results in a low leakage state with significant area overhead. In this work, we propose a top-down and bottom-up approach for propagating the input vector interval to identify low leakage input vector at primary inputs of an RTL datapath. For each module, via Monte Carlo simulation, we identify a set of MLV intervals such that maximum leakage is within (say) 10% of the lowest leakage points. As the module bit width increases, exhaustive simulation to find the low leakage vector is not feasible. Further, we need to uniformly search the entire input space to obtain as many low leakage intervals as possible. Based on empirical observations, we observe self-similarity in the subthreshold leakage distribution of adder/multiplier modules with highly regular bit-slice architectures when input space is partitioned into smaller cells. This property enables the uniform search of low leakage vectors in the entire input space where the time taken for characterization increases linearly with the module size. We further process the reduced interval set with simulated annealing to arrive at the best low-leakage vector at the primary inputs. We also propose to reduce area overhead (in some cases to 0%) by choosing Primary Input (PI) MLVs such that resultant inputs to internal nodes are also MLVs. Compared to existing work, experimental results for DSP filters simulated in 16nm technology demonstrated leakage savings of 93.6% and 89.2% for top-down and bottom-up approaches with no area overhead.

References

[1]
International Technology Roadmap for Semiconductor (ITRS). 2010. Retrieved from http://www.itrs.net/.
[2]
S. Mutoh, S. Shigematsu, and Y. Matsuya. 1996. A 1 V multi-threshold voltage CMOS DSP with an efficient power management technique for mobile phone applications. In Proceedings of the IEEE ISSC Conference. 168--169.
[3]
K. Roy. 1998. Leakage power reduction in low-voltage CMOS design. In Proceedings of the IEEE International Conference on Circuits and Systems. 167--173.
[4]
M. Powell, S. Yang, B. Falsafi, K. Roy, and T. Vijaykumar. 2000. Gated-Vdd: A circuit technique to reduce leakage in deep-submicron cache memories. In Proceedings of ISLPED. 90--95.
[5]
H. Singh, K. Agarwal, D. Sylvester, and K. J. Nowka. 2007. Enhanced leakage reduction techniques using intermediate strength power gating. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 15, 11 (11 2007), 1215--1224.
[6]
A. Abdollahi, F. Fallah, and M. Pedram. 2004. Leakage current reduction in CMOS VLSI circuits by input vector control. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 12, 2 (2 2004), 140--154.
[7]
L. Yuan and G. Qu. 2006. A combined gate replacement and input vector control approach for leakage current reduction. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14, 2 (2 2006), 173--182.
[8]
L. Yan, J. Luo, and N. K. Jha. 2003. Combined dynamic voltage scaling and adaptive body biasing for heterogeneous distributed real-time embedded systems. In Proceedings of the International Conference on Computer Aided Design (ICCAD’03). 30--37.
[9]
X. He, S. Al-Kadry, and A. Abdollahi. 2009. Adaptive leakage control on body biasing for reducing power consumption in CMOS VLSI circuit. In Quality of Electronic Design, 2009. ISQED 2009. 465--470.
[10]
Y. Lee and T. Kim. 2011. A fine-grained technique of NBTI-aware voltage scaling and body biasing for standard cell based designs. In Proceedings of the 16th Asia and South Pacific Design Automation Conference (ASP-DAC’11). 603--608.
[11]
S. Pendyala, S. A. Islam, and S. Katkoori. 2020. Gate level NBTI and leakage co-optimization in combinational circuits with input vector cycling. IEEE Transactions on Emerging Topics in Computing 8, 3 (2020), 738--749.
[12]
J. P. Halter and F. N. Najm. 1997. A gate-level leakage power reduction method for ultra-low-power CMOS circuits. In Proceedings of CICC 97—Custom Integrated Circuits Conference. 475--478.
[13]
R. M. Rao, F. Liu, J. L. Burns, and R. B. Brown. 2003. A heuristic to determine low leakage sleep state vectors for CMOS combinational circuits. In Proceedings of the International Conference on Computer Aided Design (ICCAD’03). 689--692.
[14]
B. B. Mandelbrot. 1983. Fractal Geometry of Nature. New York: Freeman.
[15]
M. Bransley. 1988. Fractals Everywhere. San Diego, CA : Academic.
[16]
J. P. Halter and F. N. Najm. 1997. A gate-level leakage power reduction method for ultra-low-power CMOS circuits. In Proceedings of CICC 97—Custom Integrated Circuits Conference. 475--478.
[17]
S. Pendyala and S. Katkoori. 2012. Interval arithmetic based input vector control for RTL subthreshold leakage minimization. In Proceedings of the IEEE/IFIP 20th International Conference on VLSI and System-on-Chip (VLSI-SoC’12). 141--146.
[18]
ASU Predictive Technology Model (PTM). 2012. Retrieved from http://ptm.asu.edu/.
[19]
H. Kawaguchi, K. Nose, and T. Sakurai. 2000. A super cut-off CMOS (SCCMOS) scheme for 0.5-V supply voltage with picoampere stand-by current. IEEE Journal of Solid-State Circuits 35, 10 (10 2000), 1498--1501.
[20]
S. Narendra, S. Borkar, V. De, D. Antoniadis, and A. Chandrakasan. 2001. Scaling of stack effect and its application for leakage reduction. In Low Power Electronics and Design, International Symposium on, 2001.195--200.
[21]
M. C. Johnson, D. D. Somasekhar, L. Y. Chiou, and K. Roy. 2002. Leakage control with efficient use of transistor stacks in single threshold CMOS. ITVLSI 10, 1 (2 2002), 1--5.
[22]
N. Hanchate and N. Ranganathan. 2004. LECTOR: A technique for leakage reduction in CMOS circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 12, 2 (2 2004), 196--205.
[23]
F. Gao and J. P. Hayes. 2006. Exact and heuristic approaches to input vector control for leakage power reduction. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 25, 11 (11 2006), 2564--2571.
[24]
R. Radjassamy and J. D. Carothers. 2003. Faster power estimation of CMOS designs using vector compaction - a fractal approach. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 33, 3 (6 2003), 476--488.
[25]
W. E. Leland, W. Willinger, M. S. Taqqu, and D. V. Wilson. 1994. Statistical analysis and stochastic modeling of self-similar datatraffic. In The Fundamental Role of Teletraffic in the Evolution of Telecommunications Networks. Teletraffic Science and Engineering, Vol. 1. Elsevier, 319--328.
[26]
H. E. Hurst. 1956. Methods of using long-term storage in reservoirs. Proceedings of the Institution of Civil Engineers 5, 5 (1956), 519--543.
[27]
U. Premarathne, U. Premaratne, and K. Samarasinghe. 2010. Network traffic self similarity measurements using classifier based Hurst parameter estimation. In Proceedings of the 5th International Conference on Information and Automation for Sustainability (ICIAFs’10). 64--69.
[28]
B. Qian and K. Rasheed. 2004. Hurst exponent and financial market predictability. In Proceedings of the 2nd IASTED International Conference on Financial Engineering and Applications, Cambridge, MA. 203--209.
[29]
R. E. Moore. 1979. “Methods and Applications of Interval Analysis”. Philadelphia, PA: Siam.
[30]
M.C. Johnson, D. Somasekhar, and K. Roy. 1999. Models and algorithms for bounds on leakage in CMOS circuits. ITCAD 18, 6 (6 1999), 714--725.
[31]
X. Xuan and A. Chatterjee. 2001. Sensitivity and reliability evaluation for mixed-signal ICs under electromigration and hot-carrier effects. In Defect and Fault Tolerance in VLSI Systems, 2001. 323--328.
[32]
T. Hickey, Q. Ju, and M. H. Van Emden. 2001. Interval arithmetic: From principles to implementation. J. ACM 48, 5 (9 2001), 1038--1068.
[33]
N. E. Evmorfopoulos, G. I. Stamoulis, and J. N. Avaritsiotis. 2002. A Monte Carlo approach for maximum power estimation based on extreme value theory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 21, 4 (4 2002), 415--432.
[34]
Q. Qiu, Q. Wu, and M. Pedram. 1998. Maximum power estimation using the limiting distributions of extreme order statistics. In Proceedings of the 1998 Design Automation Conference. 684--689.
[35]
Synopsys Nanosim. 2015. Retrieved from http://www.synopsys.com/Tools/Verification/Pages/socintegration.aspx.
[36]
W. Zhao and Y. Cao. 2006. New generation of predictive technology model for sub-45 nm early design exploration. IEEE Transactions on Electron Devices 53, 11 (11 2006), 2816--2823.
[37]
K. C. Kapur, L. R. Lamberson. 1977. Reliability in Engineering Design. New York, NY, Wiley.

Index Terms

  1. Interval Arithmetic and Self-Similarity Based RTL Input Vector Control for Datapath Leakage Minimization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Design Automation of Electronic Systems
    ACM Transactions on Design Automation of Electronic Systems  Volume 25, Issue 6
    November 2020
    164 pages
    ISSN:1084-4309
    EISSN:1557-7309
    DOI:10.1145/3417499
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 16 September 2020
    Accepted: 01 June 2020
    Revised: 01 May 2020
    Received: 01 October 2019
    Published in TODAES Volume 25, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Interval arithmetic
    2. Monte Carlo simulation
    3. self similarity
    4. subthreshold leakage

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 51
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Sep 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media