|
[1] A. Baghdadi, D. Lyonnard, N.E. Zergainoh and A.A. Jerraya, “An Efficient Architecture Model for Systematic Design of Application-Specific Multiprocessor SoC,” Proceedings of Conference on Design, Automation and Test in Europe, Munich, Mar. 2001, pp. 55-62.
[2] M. Ali, M. Welzl and M. Zwicknagl, “Networks on Chips: Scalable Interconnects for Future Systems on Chips,” Proceedings of European Conference on Circuits and Systems for Communications, Bucharest, Jul. 2008, pp. 240-245.
[3] S. Kumar, A. Jantsch, J.P. Soininen, M. Forsell, M. Millberg, J. Oberg, K. Tiensyrja and A. Hemani, “A Network on Chip Architecture and Design Methodology,” Proceedings of IEEE Computer Society Annual Symposium on Very Large Scale Integration, Pittsburgh, Apr. 2002, pp. 105-112.
[4] T. Schonwald, J. Zimmermann, O. Bringmann and W. Rosenstiel, “Network-on-Chip Architecture Exploration Framework,” Proceedings of Euromicro Conference on Digital System Design, Architectures, Methods and Tools, Patras, Aug. 2009, pp. 375-382.
[5] H.C. Chi and C.T. Tang, “A Deadlock-Free Routing Scheme for Interconnection Networks with Irregular Topologies,” Proceedings of International Conference on Parallel and Distributed Systems, Seoul, Dec. 1997, pp. 88-95.
[6] H.C. Chi and W.J. Wu, “Routing Tree Construction for Interconnection Networks with Irregular Topologies,” Proceedings of Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy, Feb. 2003, pp. 157-164.
[7] L. Benini and G. DeMicheli, “Network-on-chips: A New SoC Paradigm,” IEEE Computer, vol. 35, no.1, Jan. 2002, pp. 70-78.
[8] Ville Rantala, Teijo Lehtonen, and Juha Plosila, “Network-on-Chip Routing Algorithms,” TUCS Technical Reports 779, Turku Centre for Computer Science, Aug. 2006
[9] Christopher J. Glass Lionel M. Ni, “The Turn Model for Adaptive Routing,” Proceedings of the 19th Annual International Symposium on Computer Architecture(ISCA ‘92), vol. 20, Issue 2, May. 1992, pp. 278-287
[10] P.M. Merlin and P.J. Schweitzer, “Deadlock Avoidance in Store-and-Forward Networks: Store-and-Forward Deadlock,” IEEE Transactions on Communications, Mar. 1980, pp. 345-354
[11] P. Kermani and L. Kleinrock, “Virtual Cut-Through: A New Computer Communication Switching Technique,” Computer Networks, vol.3,1979, pp. 267-286
[12] O. Lysne, “Deadlock Avoidance for Switchs Based on Wormhole Networks,” IEEE International Conference on Parallel Processing, Sep. 1999, pp. 68-74
[13] W. J. Dally, “Virtual-channel flow control”, IEEE Transactions on Parallel and Distributed Systems, vol.3, Mar. 1992, pp.194–204.
[14] M. Koibuchi, A. Funahashi, A. Jouraku and H. Amano, “L-turn Routing: An Adaptive Routing in Irregular Networks,” Proceedings of IEEE International Conference on Parallel Processing, Sep. 2001, pp. 383-392.
[15] Jiazheng Zhou, Xuan-Yi Lin and Yeh-Ching Chung, “A Tree-Turn Model for Irregular Networks ,” Proceedings of the International Symposium on Network Computing and Applications, Jul. 2006, pp.11-18.
[16] H.C Chi and T.S Chang, “Design of a Reconfigurable Pipelined Switch for Faulty On-chip Networks,” Proceedings of International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Feb. 2011, pp.51-56
[17] N. Jiang, D.U. Becker, G. Michaelogiannakis, J. Balfour, B. Towles, J. Kim and W.J. Dally, “A Detailed and Flexible Cycle-Accurate Network-on-Chip Simulator”, IEEE Performance Analysis of systems and Software (ISPASS), April 2013, pp. 86-96.
[18] N. McKeown, “The iSLIP scheduling algorithm for input-queued switches,” IEEE/ACM Transaction on Networking, vol.7, 1999, pp.188-201
|