An ECO algorithm for eliminating crosstalk violations

Hua Xiang, Kai Yuan Chao, Martin D. F. Wong

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

7 Citations (Scopus)


ECO changes are almost inevitable in late stages of a design process. Based on an existing design, incremental change is favored since it can avoid considerable efforts of re-doing the whole process and can minimize the disturbance on the existing converged design. In this paper, we address the CVE (Crosstalk Violation Elimination) problem. Due to the changes in a multiple layer routing design, the total capacitive crosstalk on some signal wire segments on a layer may be larger than their allowable bounds after post-layout timing/noise analysis. The target is to find a new routing solution without crosstalk violations under certain constraints which help to keep the new design close to the original one. We propose a two-stage algorithm to solve CVE problems, and present optimization strategies to speed up the execution. Experimental results demonstrate the efficiency and effectiveness of our algorithm.

Original languageEnglish
Title of host publicationISPD '04
Subtitle of host publicationProceedings of the 2004 international symposium on Physical design
Place of PublicationUnited States
PublisherAssociation for Computing Machinery (ACM)
Number of pages6
ISBN (Print)9781581138177
Publication statusPublished - 19 Apr 2004
Event13th International Symposium on Physical Design, ISPD 2004 - Hyatt Regency, Phoenix, United States
Duration: 18 Apr 200421 Apr 2004 (Conference website) (Conference program)

Publication series

NameProceedings of The ACM International Symposium on Physical Design, ISPD


Symposium13th International Symposium on Physical Design, ISPD 2004
Country/TerritoryUnited States
Internet address

Scopus Subject Areas

  • Electrical and Electronic Engineering

User-Defined Keywords

  • Crosstalk
  • ECO
  • Routing


Dive into the research topics of 'An ECO algorithm for eliminating crosstalk violations'. Together they form a unique fingerprint.

Cite this