Access pattern-based code compression for memory-constrained embedded systems

O. Ozturk, H. Saputra, M. Kandemir, I. Kolcu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations


As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space requirements, power, real-time predictability, and reliability. In particular, many modern embedded systems operate under tight memory space constraints. One way of satisfying these constraints is to compress executable code and data as much as possible. While research on code compression have studied efficient hardware and software based code strategies, many of these techniques do not take application behavior into account, that is, the same compression/decompression strategy is used irrespective of the application being optimized. This paper presents a code compression strategy based on control flow graph (CFG) representation of the embedded program. The idea is to start with a memory image wherein all basic blocks are compressed, and decompress only the blocks that are predicted to be needed in the near future. When the current access to a basic block is over, our approach also decides the point at which the block could be compressed. We propose several compression and decompression strategies that try to reduce memory requirements without excessively increasing the original instruction cycle counts.

Original languageEnglish (US)
Title of host publicationProceedings - Design, Automation and Test in Europe, DATE '05
Number of pages6
StatePublished - 2005
EventDesign, Automation and Test in Europe, DATE '05 - Munich, Germany
Duration: Mar 7 2005Mar 11 2005

Publication series

NameProceedings -Design, Automation and Test in Europe, DATE '05
ISSN (Print)1530-1591


OtherDesign, Automation and Test in Europe, DATE '05

All Science Journal Classification (ASJC) codes

  • General Engineering


Dive into the research topics of 'Access pattern-based code compression for memory-constrained embedded systems'. Together they form a unique fingerprint.

Cite this