1096 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 7, JULY 2009 Short Papers Feasible Aggressor-Set Identification Under Constraints for Maximum Coupling Noise Debjit Sinha, Member, IEEE, Alex Rubin, Chandu Visweswariah, Fellow, IEEE, Frank Borkam, Gregory Schaeffer, and Soroush Abbaspour, Member, IEEE Abstract—In this paper, we consider the problem of identifying a feasible set of aggressor nets that would induce maximum crosstalk noise or delay pushout on a coupled victim net, under given logical constraints. We present a novel mathematical formulation of this problem and propose a Lagrangian relaxation-based approach for solving it efficiently and optimally. Experimental results show that the proposed approach is run-time efficient by a factor of up to 800 times in comparison to an exhaustive search approach and reduces timing pessimism by up to 36%. We also formulate and solve this problem while considering the noise susceptibility of the victim’s receiving gate. Index Terms—Aggressor-set identification, coupling noise, crosstalk, Lagrangian relaxation (LR), optimization, signal integrity. I. I NTRODUCTION Traditional coupling-aware timing or noise analysis on a given (victim) net v in the absence of any functional information assumes a pessimistic situation. All (aggressor) nets coupled to v whose switching windows overlap with that of v are considered switching1 in certain directions to compute the noise that may be induced on v in the worst case. However, given logical relations or constraints between the victim and (or) the aggressor nets, aggressor switching combinations may be restricted to obtain pessimism reduction during coupling-noise computation on v. A set of aggressor nets to a victim that satisfy given constraints is termed a feasible aggressor set. Worst-case analysis considering all aggressors (with overlapping switching windows) leads to noise overestimation or false noise. This, in turn, leads to overdesign or causes a designer to spend unnecessary time in fixing false violations. Pessimism reduction in noise analysis is consequently a key step for timing and noise closure for any given design. We thus consider the problem of identifying a feasible set of aggressor nets that would induce the worst (maximum) coupling noise on a victim net, under given switching constraints. This problem is nontrivial; an exhaustive search approach to obtain the feasible aggressor set that induces maximum coupling noise on a victim has exponential run-time complexity. The overhead of such an approach is significant for large coupling clusters, i.e., when a net has a large number of aggressors. Although aggressors whose switching windows do not overlap with that of the victim are ignored, Manuscript received August 4, 2008; revised November 20, 2008 and January 5, 2009. Current version published June 17, 2009. This work is a transaction version of the authors’ work in the Proceedings International Conference on Computer-Aided Design, pp. 790-796, 2008 [1]. This paper was recommended by Associate Editor Y.-W. Chang. D. Sinha, A. Rubin, F. Borkam, G. Schaeffer, and S. Abbaspour are with the IBM Systems and Technology Group, Electronic Design Automation, Hopewell Junction, NY 12533 USA (e-mail: [email protected]). C. Visweswariah is with the IBM Thomas J. Watson Research Center, Yorktown Heights, NY 10598 USA. Digital Object Identifier 10.1109/TCAD.2009.2018779 1 In the rest of this paper, the term switching will imply switching in a given direction. the problem size can still be large enough to make an exhaustive search approach impractical in terms of run time. For modern sub90-nm designs, coupling clusters of about 20–50 nets are common, with larger clusters having more than 150 nets [2]. It is thus important to have an efficient approach for solving the problem, particularly from a computer-aided-design-tool perspective that cannot assume limited (small) cluster sizes. It is equally important to solve this problem optimally, since a nonoptimal solution can result in an optimistic timing or noise analysis. As an example, a greedy approach which iteratively selects an aggressor that induces the worst noise while satisfying given constraints may be efficient, but cannot guarantee an optimal solution. Based on the calculated noise from the worst feasible set, optimizations (e.g., wire spacing, rerouting, and buffering) or signoff timing analysis may be performed on the given chip design. Multiple approaches toward pessimism reduction based on logical constraints during coupling-noise analysis have been proposed in the past [2]–[7]. Most prior work assume that complete functional information is available and employ satisfiability, a binary decision diagram, or branch-and-bound-based approaches for feasibility checking. These are often run-time expensive for large designs. Our contributions to this research area are the following. We present a novel formulation of the constrained aggressor-set-identification problem for maximum coupling noise as an integer linear programming (ILP) problem and then show that the problem can be treated as a linear programming (LP) problem without any loss of accuracy for most practical cases. Using constrained aggressor groups to represent simplified logical relations, we propose an efficient approach for solving this problem based on Lagrangian relaxation (LR) that guarantees the optimal solution. We also formulate this problem considering the noise susceptibility of the victim’s receiving gate and illustrate the importance of such a formulation during functional noise analysis. Prior work does not consider this during feasible aggressor-set identification. An LR-based approach is proposed for solving this problem. II. P ROBLEM D EFINITION We consider a victim net v and a set of m coupled aggressor nets a1 , a2 , . . . , am . Based on available functional information, a set of n aggressor groups is provided, which we denote as g1 , g2 , . . . , gn . Each group is fundamentally a collection of nets. A net may belong to multiple groups. Functional information imposes constraints that, at most, Ni nets in group gi could switch within a given clock cycle. Seemingly simple aggressor groups allow significant flexibility in modeling complex functional constraints, including equivalent, logic exclusivity [2], and hot-/cold-k constraints in global buses where only k nets of a bus are in a logic high/low state in a clock cycle. A brief discussion with modeling examples is presented in [1]. Given timing information (e.g., switching windows, input slews, switching directions, and analysis modes) for the victim and aggressor nets, we denote the coupling noise induced by a switching aggressor ai on v as Ψi . Mathematically, the coupling noise on v due to ai is represented as Ψi , 0, if ai is considered to be switching otherwise. (1) During timing analysis considering coupling, if the switching windows of an aggressor ai and the given victim do not overlap, it is obvious that noise induced by ai would not affect timing on the 0278-0070/$25.00 © 2009 IEEE Authorized licensed use limited to: KnowledgeGate from IBM Market Insights. Downloaded on June 25, 2009 at 13:54 from IEEE Xplore. Restrictions apply. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 7, JULY 2009 victim, and thus, Ψi = 0. Such an aggressor need not be considered in the feasible-set-identification problem. For the rest of this paper, we assume that the aggressors to a victim include only the ones that have overlapping switching windows with the victim, assuming that some early timing information is available. The total worst-case noise induced on the victim when all aggressors switch is assumed to be given by the superposition of each induced coupling noise (assuming linear driver models). Mathematically, we represent this as Ψ1 + Ψ2 + · · · + Ψm . Using an abstract model Ψi to represent coupling noise facilitates applying various noise models to our problem formulation. Examples of noise models that may be employed are presented in [1]. Given the aforementioned information and constraints, the objective of our problem is to identify the feasible set of switching aggressors that would induce maximum total coupling noise on v. III. P ROBLEM F ORMULATION In this section, we formulate our problem as an ILP problem. To denote the set of aggressors that would be considered as switching (feasible) for coupling-noise computation, we define a set of Boolean variables as follows (for each i ∈ [1, m]): Δ si = 1, 0, if ai is considered to be switching otherwise. Δ xij = if aggressor ai ∈ group gj otherwise. 1, 0, xij si ≤ Nj . (3) (4) i=1 We thus formulate our primal problem (PP) as follows: PP : max m si Ψi i=1 m s.t. xij si ≤ Nj ∀j ∈ [1, n] i=1 0 ≤ si ≤ 1, and integral ∀i ∈ [1, m]. the solution to the subproblem is also the solution to the original constrained problem is called the Lagrangian dual problem or LDP. For the Lagrangian subproblem, we choose to relax all constraints on the maximum number of aggressors that may switch in any group. Each constraint is multiplied with a nonnegative multiplier λj (corresponding to aggressor group gj , j ∈ [1, n]) and then added to the objective function. The Lagrangian subproblem (LRS/λ) is thus expressed mathematically as follows (after rearranging some terms in the objective function): LRS/λ : max n λj Nj + s1 Ψ1 − j=1 + s2 The constraint that, at most, Nj aggressors in group gj could switch within a given clock cycle is expressed as m Fig. 1. Algorithm to solve the Lagrangian subproblem. (2) From (1) and (2), the effective coupling noise that ai induces on v is expressed as si Ψi . To denote mathematically if an aggressor ai belongs to a group gj , we define a set of Boolean coefficients as follows (for each i ∈ [1, m] and j ∈ [1, n]): 1097 Ψ2 − n λj x2j n λj x1j j=1 + · · · + sm Ψm − j=1 s.t. 0 ≤ si ≤ 1, and integral n λj xmj j=1 ∀i ∈ [1, m]. (6) Given λj (∀j ∈ [1, n]), the aforementioned problem is trivial. Since si can either be 0 or 1, the objective function canbe maximized n by setting si to 1 if its corresponding term (Ψi − j=1 λj xij ) is positive and setting si to 0 if otherwise. The pseudocode for this approach to solving the Lagrangian subproblem for a given vector λ = [λ1 , λ2 , . . . , λn ] is shown in Fig. 1 and has a complexity of O(mn). It is observed that the optimal solution to LRS/λ will not change even if the integrality constraint on each si is ignored from (6) and replaced by a constraint that each si is a real number between 0 and 1 (0 ≤ si ≤ 1 ∀i ∈ [1, m]). This illustrates that the problem can be treated as a continuous optimization problem. Only in extremely rare cases that have multiple optimal solutions, treating the problem as an LP problem may result in non-Boolean solutions for some si terms. However, these cases can be handled by doing a fast local search for Boolean values around the vicinity of the nonintegral values obtained for those si variables. We employ the subgradient optimization method to solve the Lagrangian dual problem [8]. (5) It is obvious that the problem is an ILP problem, and any ILP solver could be employed to obtain the optimal solution for each si , i ∈ [1, m]. In the following section, we describe an efficient approach for solving this problem optimally. IV. F EASIBLE A GGRESSOR -S ET I DENTIFICATION A. LR-Based Solution In this section, we formulate and solve the problem in (5) using LR [8]. LR is a widely acclaimed technique for solving constrained optimization problems. In LR, “troublesome” constraints are “relaxed” and incorporated into the objective function after multiplying them with nonnegative constants called Lagrange multipliers, one multiplier for each constraint. For each fixed vector λ of the Lagrange multiplier introduced, we obtain an easier subproblem called the LR subproblem associated with λ or LRS/λ. The problem of finding a λ such that B. Greedy Approach to Feasible Aggressor-Set Identification For comparison, we present in brief a greedy heuristic for solving the feasible aggressor-set-identification problem. A naïve approach would select aggressors in the feasible set based on a sorted order of their nonincreasing noise contributions (Ψ), while satisfying group constraints. We additionally employ the intuition that an aggressor that belongs to multiple groups has a larger chance of violating a given constraint than an aggressor that belongs to only a single group. Based on this, we propose a smarter greedy approach, the pseudocode of which is shown in Fig. 2. Initially (steps 1–3 in Fig. 2), each aggressor ai is excluded from the feasible set (si = 0), and the noise contribution Ψi is scaled down by the number of groups that ai belong to. Aggressors are then sorted based on their scaled noise contributions (Ψ∗i ) and pushed into a max-stack S such that the top of the stack contains the aggressor with the largest Ψ∗ value (step 4). Aggressors are next iteratively popped from the stack and included in the feasible Authorized licensed use limited to: KnowledgeGate from IBM Market Insights. Downloaded on June 25, 2009 at 13:54 from IEEE Xplore. Restrictions apply. 1098 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 7, JULY 2009 TABLE I CONSTRAINED AGGRESSOR-SET-IDENTIFICATION RESULTS Fig. 2. Greedy algorithm for feasible aggressor-set identification. set if they do not violate the given group constraints (steps 5–9). The feasibility check in step 8 returns a Boolean to indicate if the current switching vector [s1 , s2 , . . . , sm ] satisfies all group constraints in the original problem (5). The complexity of this approach is O(m2 n) since the feasibility check in step 8 has complexity O(mn) and is done m times within the while loop in step 5. C. Experimental Results A prototype LR solver and a greedy heuristic-based solver for the feasible aggressor-set-identification problem is implemented using the C++ programming language in an industrial tool framework. A set of representative coupling clusters from an industrial test case is used for study. The results obtained are presented in Table I. In the table, m and n denote the number of aggressors and aggressor groups, respectively. We limit cluster sizes to 40 aggressors in these experiments since larger clusters (beyond m = 40) are found in less than 5% of the nets in our test case. The largest cluster size encountered in our test case is 150. In the third column, we indicate the constraints by showing the maximum number of aggressors Nj that can be considered switching in each group gj . Larger values of Nj (values closer to m) imply larger correlation between aggressor groups, i.e., a larger likelihood of an aggressor belonging to multiple groups. Increased correlation between groups make the feasible-set-identification problem more difficult to solve, since, if all aggressor sets were mutually exclusive, a greedy approach would guarantee an optimal solution. In each case, the feasible aggressor sets obtained by the proposed LR and greedy algorithms are tested for optimality using the solution obtained from an exhaustive search approach. The fourth column in Table I (|s|) shows the total number of aggressors that are considered switching (or found feasible) in the optimal solution. In the next set of three columns, k denotes the number of iterations required in solving the Lagrangian dual problem. In these columns, we show how allowing a small error tolerance (shown as %ξ) during the convergence of an iterative subgradient optimization method for solving the dual problem may reduce the number of iterations k. Results are presented for error tolerances of 0%, 2%, and 5%. As an example, we observe that, for the case of m = 15 and n = 4, k reduces from 101 to 15 and 6 after allowing a 2% and 5% error tolerance, respectively. The proposed LR approach yields the optimal solution for all cases with ξ = 0%. However, for positive ξ, LR yields suboptimal solutions in some cases. The greedy approach also fails to yield the optimal solution in some cases. To quantify the error in a computed suboptimal feasible aggressor set with total coupling noise Ψ and given the noise Ψopt from the optimal feasible aggressor set (evaluated using exhaustive search), we define an error metric as Δ Ψopt − Ψ %Error in calculated noise = × 100. (7) Ψopt The aforementioned error metric is shown for the LR approach with ξ = 2% and = 5% in columns eight and nine and for the greedy approach (Gr.) in column ten of Table I, respectively. For the LR approach with ξ = 0%, the obtained solution is optimal for all cases. It is observed from the table that, for ξ = 2%, we obtain suboptimal results in three of the 12 cases, with at most 1.6% of error (for the case with m = 15 and n = 3). Similarly, the LR approach with ξ = 5% and the greedy approach yield suboptimal solutions in six and three of the 12 cases, with errors in computed noise being, at most, 4.7% and 4.2%, respectively. A solution obtained using the greedy approach or the LR approach with a positive error tolerance (ξ) may be suboptimal, but it satisfies all group constraints. Since an obtained aggressor set is always feasible, the noise induced by the obtained set on a victim is at most the noise induced on the victim by the optimal feasible set (the optimal set induces the maximum noise by definition). This explains why the error metric in Table I is always positive. It is observed from the table that the number of required iterations for the LR approach is reasonable. For a qualitative run-time comparison, we restate that the complexity of the LR, greedy, and exhaustive search approaches are O(kmn), O(m2 n), and O(2m ), respectively. In practice, the run times of the LR and greedy approaches are found to be comparable, while the run time of the exhaustive search approach is found slower by orders of magnitude than the others for m ≥ 11. Although run times for the LR and greedy approaches are found comparable, the LR approach (even with positive error tolerance) is preferred since the former provides a way to quantify an upper bound on the error and thereby facilitates a tradeoff between run time and error. The simplicity of the greedy approach makes it a good candidate for feasible-set identification possibly in an early design flow. However, the LR approach would be desirable in a sign-off flow to avoid potential optimistic coupling analysis, resulting from an approximate (e.g., greedy) approach. Individual coupling delay pushout due to each aggressor are used as Ψi in these experiments. The group constraints employed in these experiments are a combination of designer asserted ones and those obtained from a proprietary functional analysis tool. In Table II, we present experimental results when the proposed LR approach (with ξ = 0%) is employed for aggressor filtering on a set of five 65-nm high-performance microprocessor units (subdesigns). The term aggressor filtering is used to denote that aggressors not included in the obtained feasible set of a victim are disregarded during subsequent coupling-aware timing analysis. The filtering is performed after an initial timing analysis of the design with grounded coupling capacitances. For each design, we show the number of timing points (input and output pins of gates, also includes internal pins for complex gates), the number of timing arcs (arcs between timing points), number of globally defined aggressor groups, and the number of aggressors in the largest aggressor group in columns 2–5 of the table, respectively. Authorized licensed use limited to: KnowledgeGate from IBM Market Insights. Downloaded on June 25, 2009 at 13:54 from IEEE Xplore. Restrictions apply. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 7, JULY 2009 1099 TABLE II AGGRESSOR FILTERING RESULTS FOR INDUSTRIAL TEST CASES The sixth column shows the percentage improvement in the worstslack (for setup, hold, or clock pulsewidth tests) due to couplingdelay pessimism relief from aggressor filtering. The next two columns present run times for aggressor filtering using the proposed LR-based algorithm (indicated as LR) and an exhaustive search-based feasible set solver (indicated as EXH), respectively. The run-time gain (as a ratio) of the proposed algorithm over the exhaustive search approach is shown. Some of the designs have large coupling clusters (up to about 150 nets in a cluster). To avoid impractical run times of the exhaustive search algorithm on such clusters, the EXH algorithm is forced to fail for clusters that have larger than 35 nets. As a result, this approach is unsuccessful for a number of nets in three of the five designs. The corresponding numbers are indicated in the last column of the table. The designs contain 14.4 K–126.2 K timing points and 8–8833 aggressor groups. In the design Ckt1, only eight aggressor groups are defined for some global buses. As expected, run times for aggressor filtering with the LR and EXH approaches are comparable, and slack improvements are negligible. However, with the growing number of aggressor groups and the size of each aggressor group, the run-time overhead of the EXH approach in comparison to the LR approach grows significantly (up to 800 times). It should be noted that the run times of the EXH algorithm are actually underestimated since some nets (that are part of large coupling clusters) are not filtered. For the design Ckt5, the EXH algorithm took an additional 25 h to filter the remaining 143 nets, while the LR approach filters all nets within a minute. Worst-slack improvements (includes setup, hold, or clock pulsewidth tests) between 3% and 36% are observed for the designs, indicating the importance of feasible aggressor-set identification. V. C ONSIDERING N OISE R EJECTION C URVE During functional noise verification, the noise injected on a quiet (nonswitching) victim is required to be less than the threshold that causes a potential false switching at the output of the victim’s receiving gate. The injected noise is often referred to as a noise bump or glitch. It is required that the noise bump height (peak of the glitch) be less than a threshold, which, in turn, is a function of the noise bump width. This function is termed the noise rejection curve of a gate [9] and represents the susceptibility of the gate to noise. Mathematically, the noise rejection curve of a gate denotes the maximum height of a noise bump that the gate can tolerate without failure as a function of the width of the noise bump. The width of a noise bump is traditionally defined as the ratio of the area to the peak of a noise bump. For a given victim net v, we denote the noise rejection curve of its receiving gate as N RC(w), where w denotes the width of the noise bump at the input of this gate and define δ to be the amount of noise that exceeds the gate’s noise susceptibility. We formulate the feasible aggressor-setidentification problem in the following section to maximize δ under given aggressor group constraints. bump induced on v due to ai as pi and wi , respectively. Various noise models may be employed to obtain the noise bump peak and height. For example, the 2π noise model proposed in [10] presents analytical forms for the noise bump peak and width. One commonly employed approach (in industrial tools with proven good accuracy) to compute the cumulative noise bump peak and width given the peaks and widths of the individual noise bumps is the following. The individual noise bumps are aligned so that the cumulative noise bump peak pT on v is equal to the sum of the noise bump peaks induced by each aggressor [6]. The area of the cumulative noise bump is set to the sum of all the individual noise bump areas to compute the cumulative noise bump width wT . Only those aggressors whose switching windows overlap with that of the victim are considered in the aforementioned approach. Given logical constraints (as aggressor groups) and employing notations introduced in Section III, the cumulative noise bump peak pT on v is mathematically represented as follows: pT = m si pi . (8) i=1 Based on the definition of a noise bump width in the preceding section, the cumulative noise bump width wT is computed by matching the area as follows: m spw i=1 i i i . wT = m i=1 The amount of noise that exceeds the victim’s receiving gate’s threshold (denoted as δ in the preceding section) is thus given by pT − N RC(wT ) = m si pi − N RC m si pi wi i=1 . m i=1 i=1 Given a set of aggressor nets {a1 , a2 , . . . , am } that induce noise on a victim net v, we denote the peak and the width of the noise si pi (10) Noise rejection curves are specified as lookup tables and also commonly modeled mathematically as N RC(w) = k1 + k2 w (11) for some constants k1 and k2 . Our new primal problem (N PP) considering noise rejection curve is thus formulated mathematically as follows (after ignoring the constant k1 from the objective function): N PP : max m m si pi si pi − k2 mi=1 i=1 i=1 m s.t. xij si ≤ Nj si pi wi ∀j ∈ [1, n] i=1 0 ≤ si ≤ 1, and integral A. Problem Formulation Considering Noise Rejection Curve (9) si pi ∀i ∈ [1, m]. (12) It is observed that ignoring the noise rejection curve makes the objective function identical to that of our original problem in (5), by setting Ψi = pi . Authorized licensed use limited to: KnowledgeGate from IBM Market Insights. Downloaded on June 25, 2009 at 13:54 from IEEE Xplore. Restrictions apply. 1100 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 7, JULY 2009 TABLE III CONSTRAINED AGGRESSOR-SET-IDENTIFICATION RESULTS Fig. 3. Algorithm to solve the Lagrangian subproblem. B. LR-Based Solution In this section, we present in brief an LR-based approach toward solving the feasible aggressor-set-identification problem considering noise rejection curve. For the Lagrangian subproblem, we choose to relax all constraints on the maximum number of aggressors that may switch in any group as described in Section IV-A. The new Lagrangian subproblem associated with a given vector of multipliers λ is expressed mathematically as follows (after rearranging the terms in the objective function): max n λj Nj + s1 j=1 + s2 k2 p1 − p1 − λj x1j A n k2 p2 − λj x2j A n p2 − + · · · + sm j=1 j=1 k2 pm − pm − λj xmj A n j=1 s.t. 0 ≤ si ≤ 1, and integral m ∀i ∈ [1, m] (13) where A = I=1 si pi wi . It should be noted that A is not a constant and the objective function in (13) is nonposynomial. We thus propose the following heuristic for solving this problem. Each si is initialized to Next, each si is iteratively set to 0 if the term (pi − (k2 pi /A) − 1. n λ x ) is negative until convergence. Since this term is j=1 j ij monotonically nondecreasing with increasing si , convergence is guaranteed. The pseudocode of this approach is shown in Fig. 3. We employ subgradient optimization for solving the dual problem. C. Experimental Results In Table III, we present results when the proposed algorithm is employed to identify feasible aggressor sets while considering noise rejection curves for a set of coupling clusters. The table format and legend is similar to Table I. Comparisons to solutions from exhaustive simulations (for m ≤ 30) show nonoptimal solutions obtained by the proposed heuristic for only three of the test cases; the error, as defined in (7) is shown as %Error in the last column of Table III. Errors in calculated coupling noise are found to be less than 1% on the average. The results show a reasonable number of iterations incurred during the optimization process. The experimental setup used is similar to that described in Section IV-C. In these experiments, k1 = 0.55 V and k2 = 0.007 V · nS. VI. C ONCLUSION In this paper, we present approaches for constrained aggressorset identification that induces maximum coupling noise. An efficient approach based on LR is proposed, which guarantees the optimal solution and can be easily extended to simultaneously consider all nets in a path for coupling delay pessimism reduction. The proposed approach is readily extensible to also model temporal constraints, for example, when the switching windows of two aggressors of a victim overlap with that of the victim, but do not overlap with each other. We introduce the idea and importance of considering the noise rejection curve while formulating the feasible aggressor-set-identification problem and present a heuristic to solve the problem that has less than 1% error on the average. The proposed approaches highlight their efficiency for large problem sizes (coupling cluster sizes). An engineering perspective to consider is to use an exhaustive search for feasible-set identification when the cluster size is small and use the proposed LR approach for larger clusters (m > 11). We do not limit the proposed approaches to any particular noise model. Since Ψi is used as a score to select the final set of aggressors, accurate noise analysis tools including SPICE may be employed during final timing or noise analysis while considering the obtained set of aggressors. The proposed approach cannot guarantee optimality if the noise models used to obtain the feasible set and to compute the final noise are different. However, if the noise model used to obtain the feasible set has high fidelity, this approach may be used to obtain significant pessimism reduction in functional noise or coupling aware timing analysis. R EFERENCES [1] D. Sinha, S. Abbaspour, G. Schaeffer, A. Rubin, and F. Borkam, “Constrained aggressor set selection for maximum coupling noise,” in Proc. Int. Conf. Comput.-Aided Des., 2008, pp. 790–796. [2] R. Li, A. Shey, and M. Laudes, “Incorporating logic exclusivity (LE) constraints in noise analysis using gain guided backtracking method,” in Proc. Int. Conf. Comput.-Aided Des., 2008, pp. 783–789. [3] P. Chen and K. Keutzer, “Towards true crosstalk noise analysis,” in Proc. Int. Conf. Comput.-Aided Des., 1999, pp. 132–137. [4] T. Xiao and M. Marek-Sadowska, “Functional correlation analysis in crosstalk induced critical paths identification,” in Proc. Des. Autom. Conf., 2001, pp. 653–656. [5] D. Chai, A. Kondratyev, Y. Ran, K. Tseng, Y. Watanabe, and M. Marek-Sadowska, “Temporofunctional crosstalk noise analysis,” in Proc. Des. Autom. Conf., 2003, pp. 860–863. [6] A. Glebov, S. Gavrilov, R. Soloviev, V. Zolotov, M. Becer, C. Oh, and R. Panda, “Delay noise pessimism reduction by logic correlations,” in Proc. Int. Conf. Comput.-Aided Des., 2004, pp. 160–167. [7] K. Tseng and M. Horowitz, “False coupling exploration in timing analysis,” IEEE Trans. Comput.-Aided Des., vol. 24, no. 11, pp. 1795–1805, 2005. [8] C. Chen, C. Chu, and D. F. Wong, “Fast and exact simultaneous gate and wire sizing by Lagrangian Relaxation,” IEEE Trans. Comput.-Aided Des., pp. 1014–1025, Jul. 1999. [9] A. Korshak, “Noise-rejection model based on charge-transfer equation for digital CMOS circuits,” IEEE Trans. Comput.-Aided Des., vol. 23, no. 10, pp. 1460–1465, 2004. [10] J. Cong, D. Z. Pang, and P. V. Srinivas, “Improved crosstalk modeling for noise constrained interconnect optimization,” in ACM Intl. Workshop Timing Issues Specification Synthesis Digital Systems, 2000. Authorized licensed use limited to: KnowledgeGate from IBM Market Insights. Downloaded on June 25, 2009 at 13:54 from IEEE Xplore. Restrictions apply.
© Copyright 2026 Paperzz