• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chang Xiaotao, Fan Dongrui, Han Yinhe, Zhang Zhimin. A Fast Algorithm for Leakage Power Reduction by Input Vector Control[J]. Journal of Computer Research and Development, 2006, 43(5): 946-952.
Citation: Chang Xiaotao, Fan Dongrui, Han Yinhe, Zhang Zhimin. A Fast Algorithm for Leakage Power Reduction by Input Vector Control[J]. Journal of Computer Research and Development, 2006, 43(5): 946-952.

A Fast Algorithm for Leakage Power Reduction by Input Vector Control

More Information
  • Published Date: May 14, 2006
  • As IC technologies evolve, leakage current is increased exponentially with transistor threshold voltages reduced to maintain adequate performance and noise margins. As a result, leakage power will dominate total power dissipation soon. The stack effect of CMOS transistors makes leakage power different when different input vectors are applied. Input vector control is an effective method when a circuit enters sleep mode. It becomes critical to find a vector that minimizes leakage power to be statically applied to the primary inputs of a circuit. In order to evaluate various algorithms, a gate-level combinational circuit simulator is developed. An algorithm based on probabilities propagation is presented. Experimental results on ISCAS85 benchmark and Godson CPU show that this algorithm can accelerate calculation over triply with acceptable accuracy (error rate about 0.14%).
  • Related Articles

    [1]Wu Jinjin, Liu Quan, Chen Song, Yan Yan. Averaged Weighted Double Deep Q-Network[J]. Journal of Computer Research and Development, 2020, 57(3): 576-589. DOI: 10.7544/issn1000-1239.2020.20190159
    [2]Zhu Fei, Wu Wen, Liu Quan, Fu Yuchen. A Deep Q-Network Method Based on Upper Confidence Bound Experience Sampling[J]. Journal of Computer Research and Development, 2018, 55(8): 1694-1705. DOI: 10.7544/issn1000-1239.2018.20180148
    [3]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [4]Chen Junyu, Zhou Gang, Nan Yu, Zeng Qi. Semi-Supervised Local Expansion Method for Overlapping Community Detection[J]. Journal of Computer Research and Development, 2016, 53(6): 1376-1388. DOI: 10.7544/issn1000-1239.2016.20148339
    [5]He Xianmang, Chen Yindong, Li Dong, Hao Yanni. Study on Semi-Homogenous Algorithm Based on Ring Generalization[J]. Journal of Computer Research and Development, 2015, 52(10): 2382-2394. DOI: 10.7544/issn1000-1239.2015.20150494
    [6]Yang Shilai, Yang Yahui, Shen Qingni, and Huang Haizhen. A Method of Intrusion Detection Based on Semi-Supervised GHSOM[J]. Journal of Computer Research and Development, 2013, 50(11): 2375-2382.
    [7]Li Yufeng, Huang Shengjun, and Zhou Zhihua. Regularized Semi-Supervised Multi-Label Learning[J]. Journal of Computer Research and Development, 2012, 49(6): 1272-1278.
    [8]Liu Tao, He Yanxiang, Xiong Qi. A Q-Learning Based Real-Time Mitigating Mechanism against LDoS Attack and Its Modeling and Simulation with CPN[J]. Journal of Computer Research and Development, 2011, 48(3): 432-439.
    [9]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Yang Jian, Wang Jue, Zhong Ning. Laplacian Semi-Supervised Regression on a Manifold[J]. Journal of Computer Research and Development, 2007, 44(7): 1121-1127.

Catalog

    Article views (633) PDF downloads (591) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return