{"id":"https://openalex.org/W1994216113","doi":"https://doi.org/10.1049/iet-cdt:20070104","title":"Optimal subgraph covering for customisable VLIW processors","display_name":"Optimal subgraph covering for customisable VLIW processors","publication_year":2008,"publication_date":"2008-12-22","ids":{"openalex":"https://openalex.org/W1994216113","doi":"https://doi.org/10.1049/iet-cdt:20070104","mag":"1994216113"},"language":"en","primary_location":{"id":"doi:10.1049/iet-cdt:20070104","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-cdt:20070104","pdf_url":null,"source":{"id":"https://openalex.org/S28293273","display_name":"IET Computers & Digital Techniques","issn_l":"1751-8601","issn":["1751-8601","1751-861X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Computers &amp; Digital Techniques","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086487289","display_name":"Yashuai L\u00fc","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Y.-S. Lu\u0308","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101790620","display_name":"Li Shen","orcid":"https://orcid.org/0000-0001-9043-2998"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"L. Shen","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044840341","display_name":"Libo Huang","orcid":"https://orcid.org/0000-0001-7878-3998"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"L.-B. Huang","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108047876","display_name":"Zhenyong Wang","orcid":"https://orcid.org/0000-0001-8236-7073"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Z.-Y. Wang","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023506057","display_name":"Nong Xiao","orcid":"https://orcid.org/0000-0002-2166-977X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"N. Xiao","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, Hunan 410073, People's Republic of China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086487289"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":null,"fwci":1.0398,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79549704,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"1","first_page":"14","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/very-long-instruction-word","display_name":"Very long instruction word","score":0.9430582523345947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8911300897598267},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.6678698658943176},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.6281022429466248},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.5737140774726868},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5263410806655884},{"id":"https://openalex.org/keywords/extensibility","display_name":"Extensibility","score":0.4628984034061432},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.46270468831062317},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.41966143250465393},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17309057712554932}],"concepts":[{"id":"https://openalex.org/C170595534","wikidata":"https://www.wikidata.org/wiki/Q249743","display_name":"Very long instruction word","level":2,"score":0.9430582523345947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8911300897598267},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.6678698658943176},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.6281022429466248},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.5737140774726868},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5263410806655884},{"id":"https://openalex.org/C32833848","wikidata":"https://www.wikidata.org/wiki/Q4115054","display_name":"Extensibility","level":2,"score":0.4628984034061432},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46270468831062317},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.41966143250465393},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17309057712554932},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1049/iet-cdt:20070104","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-cdt:20070104","pdf_url":null,"source":{"id":"https://openalex.org/S28293273","display_name":"IET Computers & Digital Techniques","issn_l":"1751-8601","issn":["1751-8601","1751-861X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Computers &amp; Digital Techniques","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.4399999976158142,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1686420892","https://openalex.org/W1972303747","https://openalex.org/W2034841960","https://openalex.org/W2094079167","https://openalex.org/W2098363613","https://openalex.org/W2110350195","https://openalex.org/W2111488604","https://openalex.org/W2121156724","https://openalex.org/W2132605419","https://openalex.org/W2132660104","https://openalex.org/W2154051217","https://openalex.org/W2155509874","https://openalex.org/W2169406908","https://openalex.org/W2739649174","https://openalex.org/W4229745793","https://openalex.org/W6741460227"],"related_works":["https://openalex.org/W2171066426","https://openalex.org/W2091059919","https://openalex.org/W1588619283","https://openalex.org/W1897551170","https://openalex.org/W2164026451","https://openalex.org/W2050874000","https://openalex.org/W2116296227","https://openalex.org/W2163046274","https://openalex.org/W2613504015","https://openalex.org/W192252314"],"abstract_inverted_index":{"It":[0],"is":[1,84,90,117,132],"increasingly":[2],"common":[3],"to":[4,101,126,157],"see":[5],"the":[6,44,77,129,135,147,159,166],"combination":[7],"of":[8,46,71,76,80],"single-issue":[9],"general":[10],"purpose":[11],"processors":[12,17,28,116],"(GPPs)":[13],"with":[14,24],"extensible":[15,26,73,115],"VLIW":[16,27],"in":[18],"many":[19],"embedded":[20],"system":[21],"designs.":[22],"Compared":[23],"GPPs,":[25],"can":[29,63],"exploit":[30],"instruction-level":[31],"parallelism,":[32],"and":[33,68,134],"they":[34,42],"are":[35,124,154],"more":[36],"suitable":[37],"for":[38,51,113],"computation-intensive":[39],"tasks.":[40],"Moreover,":[41],"offer":[43],"ability":[45],"customising":[47],"instruction-set":[48,72],"extensions":[49],"(ISEs)":[50],"an":[52,105],"application":[53],"domain.":[54],"Many":[55],"previous":[56,95],"works":[57,96],"reveal":[58],"that":[59,110,128,162],"automated":[60,81],"extension":[61,82],"generation":[62,83],"greatly":[64],"improve":[65],"both":[66],"performance":[67],"design":[69],"efficiency":[70],"processors.":[74],"One":[75],"key":[78],"steps":[79],"subgraph":[85,107,149],"selection.":[86],"Since":[87],"this":[88],"problem":[89],"at":[91],"least":[92],"NP-hard,":[93],"most":[94],"rely":[97],"on":[98,144,165],"greedy":[99,142],"approaches":[100],"address":[102],"it,":[103],"whereas":[104],"optimal":[106,136,148],"mapping":[108],"methodology":[109,131],"customises":[111],"ISEs":[112,163],"multi-issue/VLIW":[114],"presented":[118],"here.":[119],"Several":[120],"effective":[121],"pruning":[122],"techniques":[123,153],"proposed":[125,130,156],"ensure":[127],"tractable,":[133],"method":[137,143],"performs":[138],"41.02%":[139],"better":[140],"than":[141],"average.":[145],"Besides":[146],"covering":[150],"methodology,":[151],"several":[152],"also":[155],"reduce":[158],"area":[160],"burden":[161],"impose":[164],"processor.":[167]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
