{"id":"https://openalex.org/W2161207871","doi":"https://doi.org/10.1145/1120725.1120884","title":"Runtime leakage minimization through probability-aware dual-Vt or dual-tox assignment","display_name":"Runtime leakage minimization through probability-aware dual-Vt or dual-tox assignment","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2161207871","doi":"https://doi.org/10.1145/1120725.1120884","mag":"2161207871"},"language":"en","primary_location":{"id":"doi:10.1145/1120725.1120884","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1120725.1120884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 conference on Asia South Pacific design automation  - ASP-DAC '05","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100640623","display_name":"Dongwoo Lee","orcid":"https://orcid.org/0000-0001-5531-2819"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dongwoo Lee","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026311377","display_name":"David Blaauw","orcid":"https://orcid.org/0000-0001-6744-7075"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Blaauw","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000767141","display_name":"Dennis Sylvester","orcid":"https://orcid.org/0000-0003-2598-0458"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dennis Sylvester","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100640623"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":1.8141,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.86464295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"399","last_page":"399"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10363","display_name":"Low-power high-performance VLSI design","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10363","display_name":"Low-power high-performance VLSI design","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10472","display_name":"Semiconductor materials and devices","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.7145335078239441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6413074135780334},{"id":"https://openalex.org/keywords/minification","display_name":"Minification","score":0.6193482875823975},{"id":"https://openalex.org/keywords/scaling","display_name":"Scaling","score":0.54522305727005},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4897732734680176},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3517923951148987},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3416327238082886},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13319319486618042},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11905628442764282}],"concepts":[{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.7145335078239441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6413074135780334},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.6193482875823975},{"id":"https://openalex.org/C99844830","wikidata":"https://www.wikidata.org/wiki/Q102441924","display_name":"Scaling","level":2,"score":0.54522305727005},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4897732734680176},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3517923951148987},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3416327238082886},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13319319486618042},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11905628442764282},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1120725.1120884","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1120725.1120884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 conference on Asia South Pacific design automation  - ASP-DAC '05","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2026078757","https://openalex.org/W2042352336","https://openalex.org/W2100379261","https://openalex.org/W2104208957","https://openalex.org/W2114621701","https://openalex.org/W2121955111","https://openalex.org/W2124276471","https://openalex.org/W2149898688","https://openalex.org/W2150032780","https://openalex.org/W2165788555","https://openalex.org/W2169033838"],"related_works":["https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W41015297","https://openalex.org/W4280645561"],"abstract_inverted_index":{"With":[0],"process":[1],"scaling":[2],"runtime":[3,36,101],"leakage":[4,30,37,142],"current,":[5],"when":[6],"the":[7,43,99,112],"circuit":[8,50],"is":[9],"operating,":[10],"has":[11],"become":[12],"a":[13,28,49,60,63,69,87,107],"major":[14],"concern":[15],"in":[16,48],"addition":[17],"to":[18,52,82,98],"traditional":[19],"standby":[20],"mode":[21],"leakage.":[22,102],"In":[23],"this":[24],"paper":[25],"we":[26,104],"propose":[27,68,106],"new":[29],"reduction":[31],"method":[32,70],"that":[33,42,56,71,85],"specifically":[34,109],"targets":[35],"current.":[38],"We":[39,66],"first":[40],"observe":[41],"state":[44,75],"probabilities":[45,76,126],"of":[46,90],"nodes":[47],"tend":[51],"be":[53],"skewed,":[54],"meaning":[55],"they":[57],"have":[58,86],"either":[59],"high":[61,88],"or":[62],"low":[64],"value.":[65],"then":[67],"exploits":[72],"these":[73],"skewed":[74,124],"by":[77],"setting":[78],"only":[79],"those":[80],"transistors":[81],"high-Vt":[83],"(thick-oxide)":[84],"likelihood":[89],"being":[91],"OFF":[92],"(ON)":[93],"and":[94,117,136,139],"hence":[95],"contributing":[96],"significantly":[97],"total":[100],"Accordingly,":[103],"also":[105],"library":[108],"tailored":[110],"for":[111],"proposed":[113],"approach,":[114],"where":[115],"Vt":[116,135],"Tox":[118,137],"assignment":[119,138],"with":[120],"favorably":[121],"trade-offs":[122],"under":[123],"input":[125],"are":[127],"provided.":[128],"The":[129],"optimization":[130],"algorithm":[131],"performs":[132],"simultaneous":[133],"sizing,":[134],"shows":[140],"substantial":[141],"improvement":[143],"over":[144],"probability-unaware":[145],"optimization.":[146]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
