A Shift Register Based Linear Systolic Array for the General Knapsack Problem

نویسندگان

  • R. ANDONOV
  • R. Andonov
  • P. Quinton
  • S. Rajopadhye
  • D. Wilde
چکیده

We present a shift register based systolic array for a class recurrences with dynamic dependencies called knapsack problem recurrences. All previous arrays or parallel implementations led to either low eeciency or to complicated control. To the best of our knowledge, the proposed design is the rst realistic pure systolic and optimal array for a pseudo-polynomial, NP-complete problem. The key feature of the array is that it requires almost no control circuitry. Un r eseau lin eaire systolique a base de registres a d ecalage pour le probl eme de sac a dos R esum e : Nous pr esentons un r eseau purement systolique a base de registres a d ecalage pour le probl eme du sac a dos. C'est un probl eme pseudo-polynomial NP-complet dont les equations r ecur-rentes pr esentent des d ependances de donn ees dynamiques. Tous les r eseaux et impl ementations parall eles a ce jour s'av eraient soit peu eecaces, soit d'un contr^ ole complexe, soit non purement systoliques. Une autre caract eristique importante de notre r eseau est la simplicit e de sa logique de contr^ ole: toute l'information de contr^ ole tient en deux bits d' etat qui sont initialis es pendant le chargement des donn ees du probl eme. Ceci economise l' equivalent de 12 registres et nous permet d'am eliorer encore le temps d'ex ecution. Le gain de temps est estim e a 38% sans diminution de la surface du circuit.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Knapsack on VLSI: from Algorithm to Optimal Circuit

We present a parallel solution to the unbounded knapsack problem on a linear systolic array. It achieves optimal speedup for this well-known, NP-hard problem on a model of computation that is weaker than the PRAM. Our array is correct by construction, as it is formally derived by transforming a recurrence equation specifying the algorithm. This recurrence has dynamic dependencies, a property th...

متن کامل

An Optimal Algo-Tech-Cuit for the Knapsack Problem

We present a formal derivation and proof of correctness of a systolic array for the knapsack problem, a well known, NP-complete problem. The dependency graph of the algorithm is not completely known statically, so the derivation also serves as a case study for systolic synthesis for this class of programs. The array is itself important since it achieves optimal performance on a model much weake...

متن کامل

Bit Swapping Linear Feedback Shift Register For Low Power Application Using 130nm Complementary Metal Oxide Semiconductor Technology (TECHNICAL NOTE)

Bit swapping linear feedback shift register (BS-LFSR) is employed in a conventional linear feedback shirt register (LFSR) to reduce its power dissipation and enhance its performance. In this paper, an enhanced BS-LFSR for low power application is proposed. To achieve low power dissipation, the proposed BS-LFSR introduced the stacking technique to reduce leakage current. In addition, three diffe...

متن کامل

Exploiting the Inherent Fault Tolerance of Asynchronous Arrays

and disadvantages is currently being prepared for publication [15]. Its major drawback is area (true for asynchronous designs in general): but It claims three Important advantages over the equivalent synchronous systolic array: faster throughput, reduced design complexity and greater reliability. For the purposes of this paper we will illustrate how four state asynchronous coding works using a ...

متن کامل

Cryptanalysis of Hardware-Oriented Ciphers the Knapsack Generator, and SHA-1

Symmetric key cryptographic algorithms provide confidentiality, integrity, and authentication in modern communication systems. Our confidence in these algorithms is largely based on the fact that intense cryptanalysis has been carried out over several years without revealing any weakness. This thesis makes three independent contributions to the cryptanalysis of symmetric key primitives and hash...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994