A novel design methodology for error-resilient circuits in near-Threshold computing

Jaemin Lee, Sunmean Kim, Youngmin Kim, Seokhyeong Kang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Recently, supply voltage has been reduced for low power applications, and near threshold computing (NTC) is considered as a promising solution for optimal energy efficiency. However, NTC suffers a significant performance degradation, which is prone to timing errors. Thus, in order to improve the reliability of NTC operations, error-resilient techniques are indispensable, though they cause area and power overheads. In this paper, we propose a design methodology which provides an optimal implementation of error- resilient circuits. A modified Quine-McCluskey (O-M) algoiithm is exploited to earn the minimum set of error- resilient circuits without any loss of detection ability. From the proposed design flow, benchmark results show that optimal design reduces up to 72% of required flip-flops to be changed to error-resilient circuits without compromising an error detection ability.

Original languageEnglish
Title of host publication2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509027439
DOIs
StatePublished - 3 Jan 2017
Event2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016 - Seoul, Korea, Republic of
Duration: 26 Oct 201628 Oct 2016

Publication series

Name2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016

Conference

Conference2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016
Country/TerritoryKorea, Republic of
CitySeoul
Period26/10/1628/10/16

Keywords

  • Error- resilient circuit
  • Near-Threshold computing (NTC)
  • Quine-mccluskey (Q-M) algorithm

Fingerprint

Dive into the research topics of 'A novel design methodology for error-resilient circuits in near-Threshold computing'. Together they form a unique fingerprint.

Cite this