Planning buffer locations by network flows

Xiaoping Tang, D. F. Wong

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

49 Citations (Scopus)

Abstract

The problem of planning the locations of large number of buffers is of utmost importance in deep submicron VLSI design. Recently, Cong et al in [1] proposed an algorithm to directly address this problem. Given a placement of circuit blocks, a key step in [1] is to use the free space between the circuit blocks for inserting as many buffers as possible. This step is very important because if all buffers can be inserted into existing spaces, no expansion of chip area would be needed. An effective greedy heuristic was used in [1] for this step. In this paper, we give a polynomial-time optimal algorithm for solving the problem of inserting maximum number of buffers into the free space between the circuit blocks. In the case where the `costs' of placing a buffer at different locations are different, we can guarantee to insert maximum number of buffers with minimum total cost. Our algorithm is based on efficient min-cost network-flow computations.

Original languageEnglish
Title of host publicationISPD '00
Subtitle of host publicationProceedings of the 2000 International Symposium on Physical Design
PublisherAssociation for Computing Machinery (ACM)
Pages180-185
Number of pages6
ISBN (Print)9781581131918
DOIs
Publication statusPublished - May 2000
Event2000 International Symposium on Physical Design, ISPD 2000 - San Diego, United States
Duration: 9 Apr 200012 Apr 2000
https://dl.acm.org/doi/proceedings/10.1145/332357 (Conference proceedings )

Publication series

NameProceedings of the 2000 International Symposium on Physical Design, ISPD

Symposium

Symposium2000 International Symposium on Physical Design, ISPD 2000
Country/TerritoryUnited States
CitySan Diego
Period9/04/0012/04/00
Internet address

Scopus Subject Areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Planning buffer locations by network flows'. Together they form a unique fingerprint.

Cite this