Methods to cluster boolean functions for clock gating

ABSTRACT

A method to cluster Boolean functions for clock gating according to various exemplary embodiments can include identifying at least two small gating groups within a clock tree representative of an electrical network and at least two gating functions of the at least two small gating groups, wherein the at least two gating functions are Boolean functions; performing hierarchical clustering on the at least two gating functions using a similarity measure that describes a distance between the at least two gating functions such that the clustering forms a merge function of a cluster generated and displayed in a form of a dendrogram; assigning to each gating domain a merit value according to a power consumption profile of the gating domain using a merit function; and partitioning the cluster into gating groups using the dendrogram to construct a directed acyclic graph to determine a partition which maximize the overall power saving.

DESCRIPTION

1. Field

The present teachings relate to devices and methods for partitioning a set of clock gating functions into gating groups of admissible sizes, while maximizing the overall power saving obtained by the partition.

2. Introduction

In circuit design, the construction of Very Large Scale Integrated (VLSI) circuit chips recently have become increasing more complex oftentimes including millions of elements. Consequently, one important issue for circuit designers during the design process is the placement of the elements in the chip to ensure efficient operation of the circuit and to reduce the circuit's power consumption.

One technique for reducing power consumption in circuit designs is to reduce the power of a circuit's clock distribution tree by breaking up the clock into several separate clocks that can be individually controlled or disabled when some portions of the circuit do not need to be clocked. This process, known as “clock gating”, disables the clocks fed to logic blocks of the circuit when the logic blocks do not change state, or are not currently in use by the circuit. Power consumption due to the clocking of logic blocks that are not directly involved with the current operation of the circuit thereby is minimized. In other words, this means if the clock input is halted while there is no change in the circuit, it helps to reduce the power consumption.

However, one problem associated with clock gating is that clock gating adds gates to the circuit, and these extra gates add both area and power. If a designer is not careful, the extra clock gating hardware can consume more power than is saved. In order to have a net power savings, the clock gating logic must consume less power than is saved by gating the clocks off.

Clock gating of a flip-flop or latch may be performed by using a gating function which can be calculated in various ways. Since the gating function itself wastes power and requires an additional LCB (Local Clock Buffer) which wastes power as well, it may be desirable to gate a number of flip-flop or latches as “a gating group”, using the same gating function and LCB to increase the amount of power saving. In cases where there are two or more gating functions and their gating groups are too small, these groups may be merged and gated using a new gating function which is an approximation of the original gating functions.

Given a set of gating functions, as shown, for example in FIG. 1, the problem is to find a process to group several small gating domains into larger gating domains and to determine how to partition the grouped gating domains to form the larger gating domains such that power saving is maximized.

Several techniques have been proposed for inserting clock-gating circuitry into a circuit to partition the circuit's clocks. For example, this problem was previously addressed in a paper called “Power Reduction Through Clock Gating by Symbolic Manipulation” by Frans Theeuwen and Erid Seelen. The authors of this paper suggested an algorithm that, given a set of gating functions, performs clustering as follows:

-   -   1. Selects the best function for gating as the current group.     -   2. Selects a function which if merged with the current group         yields the best new group, and the merit of the new group is not         less than the merit of the original groups.     -   3. While there exists such a function, repeat step 2.     -   4. If the size of the currently obtained group exceeds a         predetermined threshold, implement the group, and remove all its         members from further consideration. Else, remove the first         function selected in step 1 from further consideration.     -   5. If more functions remains, return to step 1.

Unfortunately, there are several drawbacks with this approach. First, the algorithm builds only one group at a time based on the greedy choice performed in step 1. This can lead to sub-optimal choices during the group construction, because a function which increases the current group merit may contribute more to the overall power saving if added to other groups. Second, the aglorithm continues to build the group only while the merit is not decreasing. This may be too greedy. It might be the case that the group's merit is decreasing, but will increase as more functions are added to the group. This is because the merit of a group also depends on the group size. Finally, the aglorithm does not account for the cost of implementing the gating conditions themselves. Each gating function requires an LCB. The LCB leakage should be reflected in the group's merit calculation as it may change the final clustering results.

Furthermore, the aglorithm does not account for upper limits on the group's size, which is actually a factor considered in real design methodologies, due to LCB fan-out limits. It may also be desirable that groups having sizes which are too large should be further partitioned into several smaller groups such that power saving is maximized.

SUMMARY

The present invention may satisfy one or more of the above-mentioned desirable features. Other features and/or aspects may become apparent from the description which follows.

A method to cluster Boolean functions for clock gating according to various exemplary embodiments can include identifying at least two small gating groups within a clock tree representative of an electrical network and at least two gating functions of the at least two small gating groups, wherein the at least two gating functions are Boolean functions, performing hierarchical clustering on the at least two gating functions using a similarity measure that describes a distance between the at least two gating functions such that the clustering forms a merge function of a cluster generated and displayed in a form of a dendrogram including a plurality of nodes, wherein each internal node of the plurality of nodes represents a respective gating domain; assigning to each gating domain a merit value according to a power consumption profile of the gating domain using a merit function; partitioning the cluster into gating groups using the dendrogram to construct a directed acyclic graph and determining a longest path from a source to a sink on the directed acyclic graph in order to determine a partition which maximize the overall power saving; and if any getting group size exceeds a predetermined local clock buffer threshold, further partitioning the gating group that exceeds the predetermined local buffer threshold by selecting and assigning a lowest internal node of the selected gating group which has leaves equivalent to the predetermined local clock buffer threshold as a new gating domain, and iteratively repeating on any remaining nodes of the selected gating group said steps of performing hierarchical clustering to generate said dendrogram, assigning, and partitioning.

In the following description, certain aspects and embodiments will become evident. It should be understood that the invention, in its broadest sense, could be practiced without having one or more features of these aspects and embodiments. It should be understood that these aspects and embodiments are merely exemplary and explanatory and are not restrictive of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The skilled artisan will understand that the drawings described below are for illustrative purposes only. The drawings are not intended to limit the scope of the present teachings in any way.

FIG. 1 illustrates gating several small gating domains into larger gating domains;

FIG. 2 is a flow chart of a clock gating tool in accordance with the present teachings;

FIG. 3A illustrates a dendrogram generated by a clock gating tool in accordance with the present teachings;

FIG. 3B illustrates a set of gating groups generated by a clock gating tool in accordance with the present teachings;

FIGS. 4A and 4B illustrate distance functions used by a clock gating tool to perform hierarchical clustering in accordance with the present teachings;190

FIG. 5A illustrates a dendrogram generated by a clock gating tool in accordance with the present teachings;

FIG. 5B illustrates a directed acyclic graph (DAG) constructed using the dendrogram in FIG. 5A;

FIG. 5C illustrates an intermediate state of a directed acyclic graph (DAG) during the DAG construction algorithm; and

FIG. 6 illustrates further partitioning a gating group of a cluster which exceeds a predetermined threshold established by a clock gating tool in accordance with the present teaching.

DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS

Reference will now be made to various embodiments, examples of which are illustrated in the accompanying drawings. However, these various exemplary embodiments are not intended to limit the disclosure. On the contrary, the disclosure is intended to cover alternatives, modifications, and equivalents.

Throughout the application, description of various embodiments may use “comprising” language, however, it will be understood by one of skill in the art, that in some specific instances, an embodiment can alternatively by described using the language “consisting essentially of” or “consisting of.”

For purposes of better understanding the present teachings and in no way limiting the scope of the teachings, it will be clear to one of skill in the art that the use of the singular includes the plural unless specifically stated otherwise. Therefore, the terms “a,” “an” and “at least one” are used interchangeably in this application.

As will be appreciated by one skilled in the art, the present invention may be embodied as a system, method or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, the present invention may take the form of computer program product embodied in any tangible medium of expression having computer-usable program code embodied in the medium.

FIG. 2 illustrates an example of execution steps used in a clock gating tool that merges small gating groups into clusters using a new gating function, which is an approximation of the original gating functions, and partitions the newly formed clusters into gating groups such that power savings is maximized, according to the present invention. The clock gating tool may be configured to design a clock signal supply network (e.g., a clock tree) for a circuit layout. The clock tree generation is intended to create an electrical network to distribute a clock signal to clocked elements for use as a sequencing control for logical operations within a chip. The clock gating tool may be computer-based, and the steps may be executed on and/or by a computer. Specifically, the clock gating tool may provide a device and method for clustering clock gating conditions using hierarchical clustering based on a similarity measure defined based upon Boolean functions.

FIG. 2 illustrates the steps of the basic algorithm of the invention. The process begins in step 200 by determining an appropriate placement region for clock gating. This is accomplished by initially determining whether the circuit includes two or more gating functions wherein their gating groups are too small. For example, an automatic tool for clock gating may derive a clock gating function for each flip-flop of latch in the design. The gating functions may be, for example, Boolean functions. Furthermore, design methodology may impose a lower limit on the number of flip-flop or latches that can be driven by a single LCB. In this case, gating functions that control gating groups of size below the methodology limit are considered too small, and should be clustered.

If there are no small gating groups in the circuit suitable for clustering, the method proceeds to step 260 and ends the process.

Returning to step 200, if there exists two or more small gating groups in the circuit, the method of FIG. 2 proceeds with step 210 to build clusters of the gating functions by employing hierarchical (allgomerative) clustering using a similarity measure which describes the distance between two of the gating functions of the respective small gating groups. Given a set of gating conditions f₁, f₂, . . . , f_(n), the method performs hierarchical clustering, and the result of the agglomerative clustering is a merge tree called “a dendrogram”, as shown for example in FIG. 3A. The method may employ a distance function defined on Boolean functions to generate the clusters. Each internal node in the dendrogram may then be assigned, for example, to represent a gating domain wherein the gating condition is a conjunction of the functions in its leaves. For example in FIG. 3A, internal node IN₁ represents a gating domain wherein the gating condition is a conjunction of the functions f₁ and f₂.

The distance between the two functions, such as function f and function g, may be defined, for example, by the equation below:

${d\left( {f,g} \right)} \equiv {1 - \frac{{{f \cdot g}} + {{\forall_{s}{f \cdot g}}}}{2{{f + g}}}}$

-   -   f denotes a first gating condition;     -   g denotes a second gating condition;     -   where ● and + are logical And and Or operators, respectively, ∥         is the size of the On-set of a function;     -   ∀sf ● g denotes a conjunction of f and g where all the variables         s which are not in the support of both f and g are quantified         out;     -   2|f+g| is a normalizing term.

FIG. 4A and 4B provide examples of performing the distance calculations for function f and function g, defined over variables u₁, u₂, and u₃, according to the definition provided above.

Referring back to FIG. 2, using a merit function (i.e., a cost function), the method in step 220 assigns a merit value (m) (i.e., cost value) for each node in the dendrogram, as shown, for example, in FIG. 5A. The merit value of a node m is indicative of the power saving obtained using the gating group defined by node m (i.e., the collection of flip-flops of latches associated with the leaf nodes in m's sub-dendrogram).

The merit of a group g may be defined according to the following equation: M(g)≡|g|●Pr(f _(g))−C _(LCB)

-   -   f_(g) denotes the gating function of group g;     -   Pr(f_(g)) denotes the gating probability of f_(g); and     -   C_(LCB) denotes an expression reflecting the cost of adding LCBs         for gating the group.

In the merit function defined above, f_(g) is the conjunction of the group elements gating functions. The Pr(f_(g)) may be calculated accurately using signal probabilities and correlation information obtained from simulations.

In step 230, the method selects the gating groups using the dendrogram such that the overall merit (cost saving) is maximized. Using the dendrogram, the method partitions the function space into groups, as shown, for example, in FIG. 3B, such that the overall merit is maximized. An appropriate partitioning region of the merged gating group is determined to select the gating groups by using the dendrogram to find the optimal partition of the gating functions which maximizes the power savings with respect to the merit function defined on the merged gating group.

The constructed clusters can be optimized by minimizing a variety of cost functions. The merit function (i.e., the cost function) typically may include, for example, capacitance minimization, delay minimization, capacitance balancing, fan-out balancing, delay balancing, and any combination thereof.

The method in step 230 finds the appropriate partition, which maximizes the overall merit, by using the dendrogram shown, for example, in FIG. 5A to construct a directed acyclic graph (DAG) shown in the example of FIG. 5B. Namely, FIG. 5A illustrates an example of a dendrogram obtained by the construction algorithm provided above and its corresponding DAG (FIG. 5B).

The method may construct the DAG as shown in FIG. 5B from the dendrogram in FIG. 5A using the below algorithm:

-   -   Step 1. Create a source vertex (s) and a sink vertex (t). Add an         edge (s, t) and assign it the merit of the root node of the         dendrogram.     -   Step 2. Starting from the root node of the dendrogram, perform         the following recursively:         -   a. If the current node is a leaf node in the dendrogram,             stop recursing.         -   i. Set u as the source vertex of the edge in the graph             representing the current node in the dendrogram, and v as             the sink vertex.         -   b. Add a new vertex to the graph, denote it as t.         -   c. Add an edge (u, t) and assign it the merit of the left             child of the current node.         -   d. Add an edge (t, v) and assign it the merit of the right             child of the current node.         -   e. Continue recursively from a. with the current node's             children.     -   Step 3: The edges in the longest path in the DAG from s to t         represent the nodes (groups) in the dendrogram which maximizes         the overall merit, i.e. the power saving.

FIG. 5C illustrates an example of one iteration of the DAG construction algorithm. The example shows the state of the DAG after performing step 2 of the DAG construction algorithm on the node designated as m₃ in the dendrogram.

Once the DAG has been constructed, the method determines the longest path from the source to the sink on the DAG. The method then uses this longest path to determine the partition which maximizes the overall merit, because the overall merit is equivalent to finding the longest path from the source to the sink on the DAG.

A few assumptions worth noting are made in FIGS. 5A and 5B. First, it is assumed in the example of operation shown in FIG. 5 that given a dendrogram for each path from leaf to root only one node can be selected (i.e., a group). This assumption is made to prevent a latch or flip-flip within the circuit which belongs to more than one group from being selected. Furthermore, another assumption that may be made is that each internal node in the dendrogram includes exactly two successor nodes.

Referring back to FIG. 2, in step 240, a determination is then made whether the size of any of the newly partitioned groups exceeds a predetermined upper bound. For instance, the clustering process may be required to satisfy one or more constraints, for example, such as capacitance limits, fan-out limits, skew limits, slew limits, delay limits, and the like.

In this example, the predetermined upper bound may be established based upon the LCB. For instance, the LCBs may have a predefined fan-out size limit as an upper bound constraint, such that the method performs a further partitioning/clustering on any group that requires more than one LCB. Thus, if the size of any remaining groups exceeds a predetermined threshold K, the method returns to step 210 and performs a further partitioning on that particular sub-group.

The further partitioning/clustering process can be demonstrated by way of example with reference to FIG. 6. In the example of FIG. 6, the threshold limit K=2, the internal nodes are IN₁, IN₂, IN₃, IN₄, IN₅, IN₆, and IN₇, and the leaves are f₁, f₂, f₃, f₄, f₅, f₆, f₇, and f₈. FIG. 6 illustrates a dendrogram which has been partitioned such that newly formed group G1, contains leaves f₄, f₅, f₆, f₇, and f₈, exceeding the threshold limit of K=2.

The further partitioning/clustering process can be performed for each group whose size exceeds the predetermined threshold K by, first, selecting the lowest K nodes in the dendrogram sub-tree representing that particular group in order to obtain a tighter gating function approximation for the newly selected group. The method selects and assigns the lowest internal node of the group which has at most K leaves as the new gating domain. In FIG. 6, the method selects internal node IN₇, as the new gating domain because K=2 and the lowest most K leaves are f₇, and f₈. By repeating this process for each level of the dendrogram, beginning at the leaves and proceeding backward to the root, a tighter gating function approximation for the newly partitioned groups can be obtained, which further maximizes the power saving.

Second, in the further partitioning/clustering process, after establishing the new gating domain for the lowest most K leaves, the method builds a new dendrogram on the remaining nodes of that sub-tree and repeats the process of creating K-sized groups. Namely, the method returns to step 210 and continues the clustering process with the remaining nodes F₄, f₅ and f₆.

In step 240, if the size of the newly partitioned group is less than the predetermined upper bound, then the newly partitioned group is assigned as the new gating domain in step 250.

Although the flow diagram depicted in FIG. 2 indicates a particular order of operation and a specific granularity of process operations, in alternative embodiments the illustrated order may be varied (e.g., process operations may be performed in another order or performed substantially in parallel with one another) and one or more of the process operations may be coalesced or fragmented. Similarly, additional process operations may be added or eliminated where necessary in alternative embodiments.

For instance, both the distance and the merit functions provided above are exemplary. Therefore, both the distance and the merit functions can be altered or replaced by other definitions. For example, the term C_(LCB) in the merit function can instead be defined as the minimal required number of the LCBs for the group (based on the group size and the fan-out limit of an LCB) times the cost of each LCB (relative to a latch). Another example of an alternate definition is to embed real simulation data in the merit function, i.e. signal activity factors and correlations to make system and method of the clock gating tool more accurate.

While the preferred embodiment to the invention has been described, it will be understood that those skilled in the art, both now and in the future, may make various improvements and enhancements which fall within the scope of the claims and without departing from the scope and the teachings of the present disclosure. Thus, the claims should be construed to maintain the proper protection for the present disclosure. 

1. A method to cluster Boolean functions for clock gating, the method comprising: identifying at least two small gating groups within a clock tree representative of an electrical network and at least two gating functions of the at least two small gating groups, wherein the at least two gating functions are Boolean functions; performing hierarchical clustering on the at least two gating functions using a similarity measure that describes a distance between the at least two gating functions such that the clustering forms a merge function of a cluster generated and displayed in a form of a dendrogram including a plurality of nodes, wherein each internal node of the plurality of nodes represents a respective gating domain, wherein the hierarchical clustering uses a distance function according to an equation: wherein ${{d\left( {f,g} \right)} \equiv {1 - \frac{{{f \cdot g}} + {{\forall_{s}{f \cdot g}}}}{2{{f + g}}}}},$ f denotes a first gating condition; g denotes a second gating condition; where ● and + are logical And and Or operators, respectively, ∥ is the size of an On-set of a function; ∀sf ● g denotes a conjunction of f and g where all variables s which are not in a support of both f and g are quantified out; 2|f+g| is a normalizing term; assigning to each gating domain a merit value according to a power consumption profile of the gating domain using a merit function according to an equation: M (g)≡|g|●Pr(f_(g))−C_(LCB), f_(g) denotes the gating function of group g; Pr(f_(g)) denotes a gating probability of f_(g); and C_(LCB) denotes an expression reflecting a cost of adding LCBs for gating the group; partitioning the cluster into gating groups using the dendrogram to construct a directed acyclic graph and determining a longest path from a source to a sink on the directed acyclic graph in order to determine a partition which maximizes an overall power saving; and if any gating group size exceeds a predetermined local clock buffer threshold, further partitioning the gating group that exceeds the predetermined local buffer threshold by selecting and assigning a lowest internal node of the selected gating group which has leaves equivalent to the predetermined local clock buffer threshold as a new gating domain, and iteratively repeating on any remaining nodes of the selected gating group said steps of performing hierarchical clustering to generate said dendrogram, assigning, and partitioning. 