NON-TREE ROUTING

被引:6
作者
MCCOY, BA [1 ]
ROBINS, G [1 ]
机构
[1] UNIV VIRGINIA,DEPT COMP SCI,CHARLOTTESVILLE,VA 22903
关键词
D O I
10.1109/43.387740
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An implicit premise of existing routing methods is that the routing topology must correspond to a tree (i.e., it does not contain cycles). In this paper we investigate the consequences of abandoning this basic axiom, and instead we allow routing topologies that correspond to arbitrary graphs (i.e., where cycles are allowed). We show that non-tree routing can significantly improve signal propagation delay, reduce signal skew, and afford increased reliability with respect to open faults that may be caused by manufacturing defects and electro-migration. Simulations on uniformly distributed nets indicate that depending on net size and technology parameters, our non-tree routing construction reduces maximum sourse-sink SPICE delay by an average of up to 62%, and reduces signal skew by an average of up to 63%, as compared with Steiner routing. Moreover, up to 77% of the total wirelength in non-trees can tolerate an open fault without disconnecting the circuit.
引用
收藏
页码:780 / 784
页数:5
相关论文
共 50 条
  • [21] Discrete Buffer and Wire Sizing for Link-Based Non-Tree Clock Networks
    Samanta, Rupak
    Hu, Jiang
    Li, Peng
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2010, 18 (07) : 1025 - 1035
  • [22] DELIGNIFICTION AND BLEACHING OF NON-TREE FIBERS WITH PEROXYMONOSULPHATE .2. FLAX AND FORAGE RAPE
    STEWART, D
    MORRISON, IM
    CELLULOSE CHEMISTRY AND TECHNOLOGY, 1995, 29 (01): : 17 - 27
  • [23] Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme
    Purushothama, Byrapura Rangappa
    Amberker, B. B.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 122 - 133
  • [24] Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost
    Koti, Nishat
    Keni, Esha
    Kritika
    Purushothama, B. R.
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 564 - 572
  • [25] Discrete Buffer and Wire Sizing for Link-based Non-tree Clock Networks
    Samanta, Rupak
    Hu, Jiang
    Li, Peng
    ISPD'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN, 2008, : 175 - 181
  • [26] Intrusion Detection System for Autonomous Vehicles Using Non-Tree Based Machine Learning Algorithms
    Anthony, Cynthia
    Elgenaidi, Walid
    Rao, Muzaffar
    ELECTRONICS, 2024, 13 (05)
  • [27] Security Analysis of Tree and Non-tree Based Group Key Management Schemes Under Strong Active Outsider Attack Model
    Purushothama, B. R.
    Koti, Nishat
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1825 - 1829
  • [28] Towards Better Non-Tree Argument Mining: Proposition-Level Biaffine Parsing with Task-Specific Parameterization
    Morio, Gaku
    Ozaki, Hiroaki
    Morishita, Terufumi
    Koreeda, Yuta
    Yanai, Kohsuke
    58TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2020), 2020, : 3259 - 3266
  • [29] Large short-range variation in soil properties in a natural grassland indicates non-tree related catena disruption
    Temme, Arnaud J. A. M.
    Van der Kroef, Ilona
    Stoof, Cathelijne R.
    Ketterer, Michael E.
    CATENA, 2022, 209
  • [30] Reply to: Comments on Loehle, Correction to: A 2000-year global temperature reconstruction based on non-tree ringproxies
    NCASI, 552 S. Washington St. 224, Naperville, Il 60540, United States
    Energy Environ., 2008, 5 (775-776):