Skip to main navigation Skip to search Skip to main content

Floating-point to fixed-point transformation using extreme value theory

  • Linsheng Zhang*
  • , Yan Zhang
  • , Wenbiao Zhou
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Efficient hardware implementation of digital signal processing and communication algorithms requires using fixed-point arithmetic. However, most of these algorithms are developed in floating-point arithmetic. The automation of floating-point to fixed-point transformation is a key step for high-level synthesis. Based on Extreme Value Theory, this paper presents a novel approach to find both the optimal integer and fractional bit-widths for signals. Compared to traditional full simulation-based methods, this approach uses lightweight simulations to study the characteristics of extreme conditions. With theoretical probabilities to prevent overflows and meet the output error constraint, the proposed approach provides more practical solutions than those by analytical methods. Case studies and experimental results demonstrate its efficiency.

Original languageEnglish
Title of host publicationProceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
PublisherIEEE Computer Society
Pages271-276
Number of pages6
ISBN (Print)9780769536415
DOIs
StatePublished - 2009
Externally publishedYes
Event8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009 - Shanghai, China
Duration: 1 Jun 20093 Jun 2009

Publication series

NameProceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009

Conference

Conference8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
Country/TerritoryChina
CityShanghai
Period1/06/093/06/09

Fingerprint

Dive into the research topics of 'Floating-point to fixed-point transformation using extreme value theory'. Together they form a unique fingerprint.

Cite this