Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHODS FOR CONSTRUCTING LOOKUP TABLES FOR DIVISION AND SQUARE ROOT IMPLEMENTATIONS
Document Type and Number:
WIPO Patent Application WO/2017/196204
Kind Code:
A1
Abstract:
Control circuitry coupled to a multiply unit which includes a plurality of stage, each of which may be configured to perform a corresponding arithmetic function, may be configured to retrieve a given entry from a lookup table dependent upon a first portion of a binary representation of an input operand. An error value of an error function evaluated dependent upon a lookup value in a given entry of the plurality of entries is included in a predetermined error range. The control circuitry may be further configured to determine an initial approximation of a result of an iterative arithmetic operation using the first entry and initiate the iterative arithmetic operation using the initial approximation and the input operand.

Inventors:
NADEHZIN DMITRY (RU)
EBERGEN JOSEPHUS (US)
OLSON CHRISTOPHER (US)
Application Number:
PCT/RU2016/000302
Publication Date:
November 16, 2017
Filing Date:
May 13, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ORACLE INT CORP (RU)
NADEHZIN DMITRY (RU)
International Classes:
G06F17/17; G06F1/03; G06F7/544
Foreign References:
US6240433B12001-05-29
US5563818A1996-10-08
US7543008B12009-06-02
US4482975A1984-11-13
Attorney, Agent or Firm:
UGRYUMOV, Vladislav Mikhailovich (RU)
Download PDF:
Claims:
WHAT IS CLAIMED IS:

1. An apparatus, comprising:

a multiplier unit including a plurality of stages, wherein each stage of the plurality of stages is configured to perform a corresponding arithmetic operation; a first lookup table including a first plurality of entries, wherein for each entry of the first plurality of entries, an error value of an error function evaluated dependent upon a lookup value included in a given entry is included in a predetermined error range; and

control circuitry coupled to the multiplier unit, wherein the control circuitry is configured to:

retrieve a first entry of the first plurality of entries from the lookup table dependent upon a first portion of a binary representation of an input operand;

determine an initial approximation of a result of an iterative arithmetic operation using the first entry; and

initiate the iterative arithmetic operation using the initial approximation and the input operand. 2. The apparatus of claim 1, wherein the iterative arithmetic operation includes division, and wherein each entry of the plurality of entries includes an estimate for a reciprocal of the input operand.

3. The apparatus of claim 1, wherein the iterative arithmetic operation includes square root, and wherein each entry of the plurality of entries includes an estimate for a reciprocal of a root of the input operand.

4. The apparatus of claim 1, further comprising a second lookup table including a second plurality of entries.

5. The apparatus of claim 4, wherein the control circuitry is further configured to retrieve a second entry of the second plurality of entries dependent upon a second portion of the binary representation of the input operand. 6. The apparatus of claim 5, wherein the control circuitry is further configured to determine the initial approximation using the first entry and the second entry.

7. The apparatus of claim 6, wherein to determine the initial approximation using the first entry and the second entry, the control circuitry is further configured to add the second entry to a product of the first entry and a third portion of the binary representation of the input operand.

8. A method, comprising:

determining a first plurality of entries, wherein each entry of the first plurality of entries includes an estimate of a result of an iterative arithmetic operation; storing the first plurality of entries in a first lookup table;

receiving an input operand for the iterative arithmetic operation;

retrieving a first entry of the first plurality of entries from the first lookup table dependent upon a first part of a binary representation of the input operand; determining an initial approximation of the result of the iterative arithmetic

operation using the first entry; and

performing the iterative arithmetic operation using the initial approximation and the input operand. 9. The method of claim 8, wherein determining the first plurality includes determining a plurality of segments over a predetermined interval.

10. The method of claim 9, further evaluating an error function dependent upon at least one lookup value associated with a given segment of the plurality of segments.

11. The method of claim 10, modifying at least one segment of the plurality of segments in response to determining a value of the error function is outside a predetermine error range.

12. The method of claim 8, determining a second plurality of entries and storing the second plurality of entries in a second lookup table.

13. The method of claim 12, further comprising retrieving a second entry of the second plurality of entries from the second lookup table dependent upon a second part of a binary representation of the input operand.

14. The method of claim 13, further comprising determining the initial approximation using the first entry and the second entry.

15. A system, comprising:

a memory; and

a processor coupled to the memory, wherein the processor includes a first lookup table including a first plurality of entries, and wherein the processor is configured to:

retrieve a first entry of the first plurality of entries from the lookup table dependent upon a first portion of a binary representation of an input operand, wherein for each entry of the first plurality of entries, an error value of an error function evaluated dependent upon a lookup value included in a given entry is included in a predetermined error range;

determine an initial approximation of a result of an iterative arithmetic operation using the first entry; and

initiate the iterative arithmetic operation using the initial approximation and the input operand.

16. The system of claim 15, wherein the iterative arithmetic operation includes division, and wherein each entry of the plurality of entries includes an estimate for a reciprocal of the input operand. 17. The system of claim 15, wherein the iterative arithmetic operation includes square root, and wherein each entry of the plurality of entries includes an estimate for a reciprocal of a root of the input operand.

18. The system of claim 15, wherein the processor further includes a second lookup table including a second plurality of entries.

19. The system of claim 18, wherein the processor is further configured to retrieve a second entry of the second plurality of entries dependent upon a second portion of the binary representation of the input operand.

20. The system of claim 19, wherein the processor is further configured to determine the initial approximation using the first entry and the second entry.

Description:
METHODS FOR CONSTRUCTING LOOKUP TABLES FOR DIVISION AND SQUARE ROOT IMPLEMENTATIONS

Technical Field [0001] Embodiments described herein relate to integrated circuits, and more particularly, to techniques for performing iterative arithmetic operations within integrated circuits.

Description of the Related Art

[0002] Computing systems typically include one or more processors or processing cores which are configured to execute program instructions. The program instructions may be stored in one of various locations within a computing system, such as, e.g., main memory, a hard drive, a CD-ROM, and the like.

[0003] Processors include various functional blocks, each with a dedicated task. For example, a processor may include an instruction fetch unit, a memory management unit, and an arithmetic logic unit (ALU). An instruction fetch unit may prepare program instruction for execution by decoding the program instructions and checking for scheduling hazards, while arithmetic operations such as addition, subtraction, and Boolean operations (e.g., AND, OR, etc.) may be performed by an ALU. Some processors include high-speed memory (commonly referred to as "cache memories" or "caches") used for storing frequently used instructions or data. [0004] Some arithmetic operations, such as, e.g., division, may involve iterative calculations performed over several computing cycles. Multiple iterations may be performed until a desired level of accuracy is achieved. In some cases, additional circuitry may be added to an ALU to support the iterative calculations. SUMMARY OF THE EMBODIMENTS

[0005] Various embodiments of a computing system are disclosed. Broadly speaking, a circuit and a method are contemplated in which a multiplier unit includes a plurality of stages, each of which may be configured to perform a corresponding arithmetic operation. Control circuitry coupled to the multiplier unit may be configured to retrieve a first entry of a first plurality of entries stored in a first lookup table dependent upon a first portion of a binary representation of an input operand. For each entry of the first plurality of entries, an error value of an error function evaluated dependent upon a lookup value included in a given entry is included in a predetermined error range. The control circuitry may be further configured to determine an initial approximation of a result of an iterative arithmetic operation dependent upon a first portion of a binary representation of an input operand and initiate the iterative arithmetic operation using the initial approximation. [0006] In one embodiment, the iterative arithmetic operation includes division and each entry of the plurality of entries includes an estimate for a reciprocal of the input operand.

[0007] In a further embodiment, the iterative arithmetic operation includes square root and each entry of the plurality of entries includes an estimate for a reciprocal of a root of the input operand.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008] The following detailed description makes reference to the accompanying drawings, which are now briefly described.

[0009] FIG. 1 illustrates an embodiment of a computing system. [0010] FIG. 2 illustrates an embodiment of a processor. [0011] FIG. 3 illustrates an embodiment of a multiplier unit. [0012] FIG. 4 depicts a chart illustrating lookup table values. [0013] FIG. 5a depicts a graph illustrating lookup table values with equal segments.

[0014] FIG. 5b depicts a graph illustrating lookup table values with segments of different sizes.

[0015] FIG. 6 depicts a flow diagram illustrating an embodiment of a method for determining segments for a lookup table.

[0016] FIG. 7 depicts a flow diagram illustrating an embodiment of a method for modifying segments for a lookup table. [0017] FIG. 8 depicts a flow diagram illustrating an embodiment of another method for modifying segments for a lookup table.

[0018] FIG. 9 illustrates a block diagram for generating an initial approximation for an iterative arithmetic operation using two lookup tables. [0019] FIG. 10 depicts a flow diagram illustrating an embodiment of a method for generating an initial approximation for an iterative arithmetic operation using two lookup tables. [0020] FIG. 1 1 depicts a graph of a piecewise linear approximation of an ideal lookup curve.

[0021] FIG. 12 illustrates a diagram depicting the relationship between the lengths of portions of an initial approximation for an iterative arithmetic operation.

[0022] While the disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the disclosure to the particular form illustrated, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims. The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description. As used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words "include," "including," and "includes" mean including, but not limited to.

[0023] Various units, circuits, or other components may be described as "configured to" perform a task or tasks. In such contexts, "configured to" is a broad recitation of structure generally meaning "having circuitry that" performs the task or tasks during operation. As such, the unit/circuit/component can be configured to perform the task even when the unit/circuit/component is not currently on. In general, the circuitry that forms the structure corresponding to "configured to" may include hardware circuits. Similarly, various units/circuits/components may be described as performing a task or tasks, for convenience in the description. Such descriptions should be interpreted as including the phrase "configured to." Reciting a unit/circuit/component that is configured to perform one or more tasks is expressly intended not to invoke 35 U.S.C. § 1 12, paragraph (f interpretation for that unit/circuit/component. More generally, the recitation of any element is expressly intended not to invoke 35 U.S.C. § 112, paragraph (f) interpretation for that element unless the language "means for" or "step for" is specifically recited.

DETAILED DESCRIPTION OF EMBODIMENTS

[0024] In a computing system, arithmetic operations may be performed by an arithmetic logic unit (ALU) of a processor. The ALU may contain dedicated logic circuits, such as, e.g., an adder or multiplier, that are designed to perform certain arithmetic functions in an iterative fashion. For example, the Newton algorithm or the Goldschmidt algorithm may be employed for performing division or square root in an iterative fashion. After a number of iterations of a particular arithmetic operation, a final approximation may be generated. In order to determine the answer to the particular arithmetic operation, a rounding operation may be performed on the final approximation.

[0025] Prior to starting the iterative arithmetic operation, an initial approximation may be determined. In some cases, the initial approximation may be retrieved from a lookup table to start the iterative process. The accuracy of such initial approximation is important as an accurate initial approximation may reduce iterations, thereby saving computing cycles and power. In general, however, the more accurate the initial approximation, the larger the lookup table. Large lookup tables consume large amounts of area on an integrated circuit, which may result in a large chip and higher manufacturing costs. Additionally, large lookup tables may require additional energy to operation thereby increasing power consumption. The embodiments illustrated in the drawings and described below may provide techniques for constructing lookup tables while minimizing the size of the lookup tables.

[0026] A block diagram illustrating one embodiment of a distributed computing unit (DCU) 100 is shown in FIG. 1. In the illustrated embodiment, DCU 100 includes a service processor 110, coupled to a plurality of processors 120a-c through bus 170. It is noted that in some embodiments, system processor 110 may additionally be coupled to system memory 130 through bus 170. Processors 120a-c are, in turn, coupled to system memory 130, and peripheral storage device 140. Processors 120a-c are further coupled to each other through bus 180 (also referred to herein as "coherent interconnect 180"). DCU 100 is coupled to a network 150, which is, in turn, coupled to a computer system 160. In various embodiments, DCU 100 may be configured as a rack-mountable server system, a standalone system, or in any suitable form factor. In some embodiments, DCU 100 may be configured as a client system rather than a server system.

[0027] System memory 130 may include any suitable type of memory, such as Fully Buffered Dual Inline Memory Module (FB-DIMM), Double Data Rate, Double Data Rate 2, Double Data Rate 3, or Double Data Rate 4 Synchronous Dynamic Random Access Memory (DDR/DDR2/DDR3/DDR4 SDRAM), or Rambus® DRAM (RDRAM®), for example. It is noted that although one system memory is shown, in various embodiments, any suitable number of system memories may be employed.

[0028] Peripheral storage device 140 may, in some embodiments, include magnetic, optical, or solid-state storage media such as hard drives, optical disks, non-volatile random-access memory devices, etc. In other embodiments, peripheral storage device 140 may include more complex storage devices such as disk arrays or storage area networks (SANs), which may be coupled to processors 120a-c via a standard Small Computer System Interface (SCSI), a Fiber Channel interface, a Firewire® (IEEE 1394) interface, or another suitable interface. Additionally, it is contemplated that in other embodiments, any other suitable peripheral devices may be coupled to processors 120a-c, such as multi-media devices, graphics/display devices, standard input/output devices, etc.

[0029] In one embodiment, service processor 110 may include a field programmable gate array (FPGA) or an application specific integrated circuit (ASIC) configured to coordinate initialization and boot of processors 120a-c, such as from a power-on reset state. Additionally, in some embodiments, service processor 110 may include a programmable read-only memory (PROM) that may store instructions to perform a power-on self-test (POST). In various embodiments, service processor 110 may be configured to allow access to administrative functions such as test and debug modes of processors 120a-c, such as testing cache memories in processors 120a-c, or providing test code to processors 120a-c such that each of processors 120a-c may test their respective cache memories, for example.

[0030] As described in greater detail below, each of processors 120a-c may include one or more processor cores and cache memories. In some embodiments, each of processors 120a-c may be coupled to a corresponding system memory, while in other embodiments, processors 120a-c may share a common system memory. Processors 120a- c may be configured to work concurrently on a single computing task and may communicate with each other through coherent interconnect 180 to coordinate processing on that task. For example, a computing task may be divided into three parts and each part may be assigned to one of processors 120a-c. Alternatively, processors 120a-c may be configured to concurrently perform independent tasks that require little or no coordination among processors 120a-c. [0031] The embodiment of the distributed computing system illustrated in FIG. 1 is one of several examples. In other embodiments, different numbers and configurations of components are possible and contemplated. It is noted that although FIG. 1 depicts a multi-processor system, the embodiments described herein may be employed with any number of processors, including a single processor core.

[0032] A possible embodiment of processor is illustrated in FIG. 2. In the illustrated embodiment, processor 200 includes an instruction fetch unit (IFU) 210 coupled to a memory management unit (MMU) 220, a L3 cache interface 270, a L2 cache memory 290, and one or more of execution units 230. Execution unit(s) 230 is coupled to load store unit (LSU) 250, which is also coupled to send data back to each of execution unit(s) 230. Additionally, LSU 250 is coupled to L3 cache interface 270, which may in turn be coupled a L3 cache memory.

[0033] Instruction fetch unit 210 may be configured to provide instructions to the rest of processor 200 for execution. In the illustrated embodiment, IFU 210 may be configured to perform various operations relating to the fetching of instructions from cache or memory, the selection of instructions from various threads for execution, and the decoding of such instructions prior to issuing the instructions to various functional units for execution. Instruction fetch unit 210 further includes an instruction cache 214. In one embodiment, IFU 210 may include logic to maintain fetch addresses (e.g., derived from program counters) corresponding to each thread being executed by processor 200, and to coordinate the retrieval of instructions from instruction cache 214 according to those fetch addresses. [0034] In one embodiment, IFU 210 may be configured to maintain a pool of fetched, ready-for-issue instructions drawn from among each of the threads being executed by processor 200. For example, IFU 210 may implement a respective instruction buffer corresponding to each thread in which several recently-fetched instructions from the corresponding thread may be stored. In some embodiments, IFU 210 may be configured to select multiple ready-to-issue instructions and concurrently issue the selected instructions to various functional units without constraining the threads from which the issued instructions are selected. In other embodiments, thread-based constraints may be employed to simplify the selection of instructions. For example, threads may be assigned to thread groups for which instruction selection is performed independently (e.g., by selecting a certain number of instructions per thread group without regard to other thread groups).

[0035] In some embodiments, IFU 210 may be configured to further prepare instructions for execution, for example by decoding instructions, detecting scheduling hazards, arbitrating for access to contended resources, or the like. Moreover, in some embodiments, instructions from a given thread may be speculatively issued from IFU 210 for execution. Additionally, in some embodiments IFU 210 may include a portion of a map of virtual instruction addresses to physical addresses. The portion of the map may be stored in Instruction Translation Lookaside Buffer (ITLB) 215. [0036] Execution unit 230 may be configured to execute and provide results for certain types of instructions issued from IFU 210. In one embodiment, execution unit 230 may be configured to execute certain integer-type instructions defined in the implemented ISA, such as arithmetic, logical, and shift instructions. It is contemplated that in some embodiments, processor 200 may include more than one execution unit 230, and each of the execution units may or may not be symmetric in functionality.

[0037] Floating point unit (FPU) 280 may be configured to execute and provide results for certain floating-point and graphics-oriented instructions defined in the implemented ISA. For example, in one embodiment FPU 280 may implement single- and double-precision floating-point arithmetic instructions compliant with a version of the Institute of Electrical and Electronics Engineers (IEEE) 754 Standard for Binary Floating-Point Arithmetic (more simply referred to as the IEEE 754 standard), such as add, subtract, multiply, divide, and certain transcendental functions. Depending on the implementation, FPU 280 may include multiplier unit 285. As described below in more detail, multiplier unit 285 may be employed in an iterative fashion to approximate values for some arithmetic operations, such as, division, for example.

[0038] Load store unit 250 may be configured to process data memory references, such as integer and floating-point load and store instructions. In some embodiments, LSU 250 may also be configured to assist in the processing of instruction cache 214 misses originating from IFU 210. LSU 250 may include a data cache 252 as well as logic configured to detect cache misses and to responsively request data from L2 cache 290 or a L3 cache partition via L3 cache partition interface 270. Additionally, in some embodiments LSU 250 may include logic configured to translate virtual data addresses generated by EXUs 230 to physical addresses, such as Data Translation Lookaside Buffer (DTLB) 253. [0039] It is noted that the embodiment of a processor illustrated in FIG. 2 is merely an example. In other embodiments, different functional block or configurations of functional blocks are possible and contemplated. [0040] Turning to FIG. 3, an embodiment of multiplier unit is illustrated. In some embodiments, multiplier unit 300 may correspond to multiplier unit 285 as illustrated in FIG. 2. In the illustrated embodiment, multiplier unit 300 includes multiplication stage 302, addition stage 303, circuitry 306, and Lookup Tables 307a and 307b. Multiplier unit 300 may, in some embodiments, be used to implement one of various algorithms, such as Newton-Raphson or Goldschmidt, for example. In various embodiments, multiplier unit 300 may be configured to produce an approximation of a quotient of two floating-point numbers, a quotient of two integer numbers.

[0041] Each of multiplication stage 302, and addition stage 303 may be configured to operate on at least two operands, and may be designed in accordance with one of various multiplier architectures. For example, multiplication stage 302 of the aforementioned stages may employ Wallace Trees, or other suitable multiplier algorithm. In various embodiments, multiplier 300 may be configured to allow operands of any suitable length, such as, e.g., integer or floating-point operands.

[0042] As described below in more detail, when multiplier unit 300 is used to perform an iterative operation such as, e.g., floating-point division or integer division, input operands 304 are received and normalized by multiplier unit 300. Circuitry 306 may be configured to retrieve an initial approximation of the desired answer from either of Lookup Table 307a or Lookup Table 307b. Multiplication stage 302 may be used to perform repeated multiplication operations, starting with the initial approximation, in order to generate a final approximation for the desired quotient. When a desired level of precision has been achieved, circuitry 306 may format a remainder generated by the iterative division algorithm. Circuitry 306 may also be configured to retrieve respective values from each of Lookup Tables 307a and 307b, and combine the values in order to generate the initial approximation for the desired answer.

[0043] Each of Lookup Tables 307a and 307b may include a memory or other suitable storage circuits. In various embodiments, Lookup Tables 307a and 307b may include SRAMs, DRAMs, ROMs, Flash Memory, or any other suitable type of memory. As described below in more detail, an amount of storage, and the contents stored, may be determined according to one of various methods in order to minimize the amount of storage while maintaining a desired level of accuracy.

[0044] It is noted that the embodiment illustrated in FIG. 3 is merely an example. In other embodiments, different numbers of lookup tables and different configurations of lookup tables are possible and contemplated. [0045] As described above in regard to FIG. 3, a multiplier unit may include one or more lookup tables which may include initial estimates for iterative arithmetic operations, such as, division or square root, for example. In the case of division, a lookup table may provide an estimate for 1/5 for every value of B included in the half-open interval [1, 2). Alternatively, for square root operations, a lookup table may provide an estimate for 1/V# for every value of B included in the half-open interval [1, 4). The aforementioned intervals may be split into N segments [B„, B„ + i) for 0 < n < N, wherein N is a positive integer. A lookup value T„ may be assigned to each segment.

[0046] In the case of division, each B„ may be represented in binary 1.x, where x has k > 0 bits and N < 2 k . In some embodiments, not every k-bit representation x needs to occur in a binary representation of B„. Each value x that occurs as 1.x in the sequence B„, 0 < n < N, is commonly referred to as a key or address for a lookup value T„. The value of T„ may be an approximation of l/B and may be included in the open interval (0.5, 1). T„ may, in various embodiments, be of the form O.ly, where y includes / data bits. [0047] In the case of square root, the half-open interval [1, 4) may be split into two sub-intervals [1, 2) and [2, 4). Floating-point numbers with an even exponent will have a mantissa in [1, 2) and for floating-point numbers with odd exponents a 1 may be subtracted from the exponent and the mantissa may be doubled. The doubled mantissa will be in [2, 4). Each B n for a square root operation may be represented in binary by either l_x (for even exponents) or 2 * 1 JC (for odd exponents), where J includes £-1 bits. A single data bit may be used to indicate the parity of the exponent and k-l bits may be used to represent x. The k bits may then be used as the key for the lookup table.

[0048] It is noted that for N segments and N addresses, we have N < 2 k . Thus, for any B included in [1, 4), the address for the lookup table is given by the least-significant bit of the exponent of B and the k-l bits of the binary representation of B following the leading "1" bit. For square root, the lookup value l/V is included in the half-open interval (0.5, 1], so the lookup value may be of the form 0. ly or 1.

[0049] Turning to FIG. 4, an example of a lookup table for division and square root for k = 3 and / = 3 is illustrated. The address to the lookup table of FIG. 4 for division has 4 bits, of which the first bit is always a "1." The address to the lookup table for (floatingpoint) square root also has 4 bits, of which the first bit is the least significant bit of the exponent and the second bit is always a "1." The lookup values for division and square root each include 5 bits, of which the first two bits are always "0.1." It is noted that the table illustrated in FIG. 4 is merely an example. In other embodiments, bits that are constant in the address or a table entry may be omitted. [0050] In the case of division, the lookup value for B, which is included in the half- open interval [1, 2), may be found by finding a segment [B„, B n+ i) of which B is an element. It is noted that B is of the form 1 J Z, where x includes k bits and z is some bit sequence. If B is in [B„, B n+ i), then the lookup value is T n . In order to check if B is included in [B n , B n+ i), the address of B, i.e., the bit sequence of 1 JCZ, may be compared to values of B n , where 0 < n < N. In some embodiments, the k-bit value of x from B is used as an address to retrieve the value y from a particular entry in the lookup table. A final lookup value may then be constructed by combining the value ofy with "0.1" to generate T - O.ly. It is noted that the size of the lookup table is N * I bits. It is further noted that the above description is applicable to table lookup for division and that, in the case of square root, similar operations may be performed.

[0051] As described above, a lookup table may provide a first, or initial, approximation of a function value. After obtaining a first approximation, an approximation algorithm may successively improve upon the approximation through multiple iterations until the algorithm reaches a final approximation. The error in the final approximation depends on the error in the first approximation, the input values to the algorithm, and the algorithm itself. In various embodiments, an error requirement may be defined for the lookup table. As used and described herein, an error requirement is an amount of error less than a predetermined error limit. Additionally, a size limit may also be imposed on a lookup table.

[0052] For each segment, there may be many values T„ that can be chosen as the lookup value for the segment [B„, B„+i) that satisfy the error requirement for the lookup table. For each segment a range of (/ + 2)-bit values from which T„ may be selected may be constructed. This range may be denoted as [Tmin„, Tmax n ]. Any (/+2)-bit value of T„ of the form O.ly in [Tmin n , Tmax„] may be a valid lookup value for the segment [B„, B„+i).

[0053] Turning to FIG. 5A and FIG. 5B, examples of lookup tables and ranges for lookup values are illustrated. FIG. 5 A depicts a case including 16 equal length segments. Each of the segments has a range for lookup values as denoted by an associated error bar. FIG. 5B depicts a case including 8 segments. The segments included in FIG. 5B may not be of the same length, and each segment has a single lookup value designated by a corresponding horizontal line. [0054] In some embodiments, the segments included in FIG. 5B may be derived from those included in FIG. 5A by merging neighboring segments that differ in their least- significant address bit and that have overlapping lookup ranges. In the event that the lookup ranges have a non-empty intersection, any single lookup value from the intersection may be selected as the lookup value for the merged segments. By merging segments, the number of segments is reduced along with the number of lookup values.

[0055] In determining the number of segments for a lookup table, selecting large segments may result in not being able to satisfy the error requirement for some of the segments. Alternatively, if small segments are selected, the error requirement may be satisfied for each segment, but the total number of segments may be large, resulting in a large lookup table. It is noted that not all of the segments need to be the same size and that boundaries for the segments should be represented with binary numbers including as few bits as possible.

[0056] For division operations, a relative error for entries in a lookup table may be defined as shown in Equation 1, where u is the relative error for a given B included in [Bn, B n+ j). The range of values of u is important in the construction of a lookup table. u = 1 - BT n ^

[0057] If B is included in [B„, B n+ i), then the range of possible values for u may be denoted as UDIV n as depicted in Equation 2. The value of T„ may then be chosen such that the interval UDIV n is symmetric around 0. In some embodiments, T„ is selected as the (/ + 2)-bit value that is closest to 2/( B n + B„ +J ).

UDIV n = (1 - B n+1 T n , 1 - B n T n ] (2) [0058] A relative error for a segment included in a lookup table for square root operations may be determined in a similar fashion. In this case, the relative error u may be defined as depicted in Equation 3. The range of values for u may be defined as shown in Equation 4. The value of T„ may then be chosen so that the interval USQRT„ is symmetric around 0. T n T n

(3)

USQRT n = (1 - B n+1 T n T n , 1 - B n T n T n ]

[0059] The choice for the segments and for the corresponding lookup values determine whether or not the error requirement will be satisfied. The error requirement stipulates that the error in the final approximation is below a predetermined error threshold. The error in the final approximation may defined as shown in Equation 5, where approx. is the value produced by the approximation algorithm, and exact is the exact solution.

Error = approx— exact

[0060] The error in the final approximation may depend on a variety of factors. For example, for the quotient AIB, the error in the final approximation depends on the approximation algorithm, and the values A, T, u, and eps, where eps is a vector of truncation errors made at various stages in the Goldschmidt algorithm. It is noted that the value of B determines the lookup value Tand the relative error u. [0061] Since the approximation algorithm is a succession of arithmetic operations such as, e.g., addition, multiplication, and the like, the expression for the error in the algorithm is a polynomial in the variables u, A, T, and eps. For the purpose of creating the lookup tables, the exact expression for the error in the algorithm is not necessary, as long as there is an expression for the error. In the description that follows, the expression for the error in the algorithm will be denoted by the function Error(A,T,u,eps).

[0062] Each of the parameters A, T, u, and the elements of vector eps, is included in a given interval. For example, A may be included in the half-open interval [1, 2) and each element of eps may be included in the half-open interval [0, 2 ~M ) where M is a positive integer. Moreover, for each n included in 0 < n < N, there is a fixed lookup value T„ and an interval U„ for the relative error u. Since the aforementioned parameters are individually bounded, the overall error in the algorithm may also be bounded as depicted in Equation 6.

LowerBound < Error (A, T n , u, eps) < UpperBound

[0063] LowerBound and UpperBound are the desired lower and upper bounds for the Error function. For example, in one particular implementation of the Goldschmidt algorithm for floating-point division, LowerBound = 0 and UpperBound = ulp/4, where ulp = 2 "52 for double-precision and ulp = 2 "23 for single-precision division. In another example using the Goldschmidt algorithm to implement floating-point square root, LowerBound = 0 and UpperBound = ulpll, where ulp = 2 "52 for double-precision and ulp = 2 "23 for single-precision square root. [0064] In some embodiments, the previously described error bounds may depend on the choice n for 0 < n < N. In particular, the error bounds may depend on the value of B„. By allowing error bounds that vary with n, the error requirement may be relaxed and the process of finding lookup values for each segment may be simplified. When variable error bounds are employed, Equation 6 may be modified as shown in Equation 7.

LowerBound n < Error {A, T n , u, eps) < UpperBo nd n

[0065] As described above, when employing variable error bounds, the error requirement may be relaxed. For example, in the case of 64-bit integer division, fixed error bounds for all n may be selected as shown in Equations 8 and 9, where ulp = 2 "63

LowerBound = 0

(8)

UpperBound = 2ulp

(9)

[0066] If, however, in the case of variable error bounds, the error bounds may be selected as shown in equations 10 and 1 1, where g(B„) is a function of B„ returning a natural number. In the case of integer division, the function g(B„) may be defined as shown in Equation 12, where B n = \ .x for any string of x of k bits.

LowerBound n — 0

(10)

UpperBound n = 2ulp2 a( - Bn) (1 1) g l. x) = k— m(x (12)

[0067] The function m{x) may return the number of trailing zeros in x. It is noted that, in general, 0 < g(l JC) < k. When J is a string of k zeros, the m(x) = k, so g(\ JC) = 0. For other values of x, g(l .x) > 0. With variable bounds for integer division the error interval may be enlarged for most segments by several factors 2. It is noted that although the above description is generally directed towards integer division, similar techniques may be employed for other operations, such as, floating-point division, and square root operations, for example.

[0068] In the case when integer division and floating-point division used the same lookup table, then the requirements associated with each operation must be combined for the lookup table to ensure that the error requirement is satisfied for both integer division and floating-point division. For example, a combined lookup table for 64-bit integer division and floating-point division (both single and double precision) may use variable error bounds as defined in Equations 13 and 14.

Lower Bound n = 0 UpperBound n = min(2 -53 , 2 ~62+ ^ B ^) ^

[0069] Turning to FIG. 6, a flow diagram depicting an embodiment of a method for generating a lookup table is illustrated. The method begins in block 601. A number of segments may then be determined (block 602). As described above, the number of segments may be selected in order to minimize a size of the lookup table while still providing sufficient accuracy.

[0070] Once the segments have been determined, lookup value ranges and lookup values for each segment may then be determined (block 603). As described below, lookup ranges may be determined by checking smaller intervals in order to reduce computational time and resources. The error requirement may then be checked for candidate lookup values within a particular lookup range (block 604). The method may then depend on results of the error requirement check (block 605).

[0071] If the error requirement is satisfied for all segments, the method may conclude in block 607. Alternatively, if the error requirement is not satisfied for all segments, the choice of segments may be modified (block 606). As described below in more detail, segments may be divided into smaller segments, or pairs of adjacent segments may be merged into larger segments.

[0072] It is noted that the embodiment of the method illustrated in FIG. 6 is merely an example. In other embodiments, different operations and different orders of operations are possible and contemplated.

[0073] As described above in regard to block 603, for each segment, a range of possible lookup values may be determined. For a given segment, there may be multiple possible values of T„ that may satisfy the error requirement. For example, if an interval is calculated for Error(A, T n , u, eps) for each (/ + 2)-bit value T in [Tmin„, Tmax„], where 1+2 is the number of output bits included in T, and the error requirement holds for all of the (/ + 2)-bit values T in [Tmin„, Tmax n ], then then range [Tmiti„, Tmax n ] of lookup values for the given segment is valid.

[0074] Checking if each value of T satisfies the error requirement may be computationally expensive. To reduce the computational effort, a pool of candidate values of T may be created, wherein each candidate value included in the pool satisfies a weaker version of the error requirement.

[0075] To generate a pool of candidates for the interval [Tmin„, Tmax„], smaller intervals may be checked to see if Equation 7 holds. Specific choices of A, u, and eps, as depicted in Table 2, may be used during the checking process. For each choice of T, the values of U min _ n and U max, „ are given by Equations 15 and 16.

[0076] Table 1 Interval Choices for A, u, and eps, where EPS is defined as a vector of intervals for all truncation errors.

Umin,n(T) - 1 - B n+1 T

(15) Umax,n(T = 1 - B n T (16)

[0077] Only the values for eps are only taken over a series of small intervals. A, T, and u are constants for each of the four evaluations. It is noted that the four choices for A and u are the four corners points of the intervals A 6 [1, 2) andw £ [U min n (T), U max n T)) . When a particular interval evaluation fails, then the corresponding value of T is eliminated as a possible candidate.

[0078] Once a pool of candidate values of T has been obtained for the range [Tmin n , Tmax„], an interval evaluation for each candidate T may be performed. If the interval evaluation fails, it may still be possible that the constraints are satisfied, but that the interval evaluation is too pessimistic. After such a failure, an interval may be split into smaller intervals, which still cover the whole space of intervals and perform an interval evaluation for the smaller intervals. If all smaller interval evaluations satisfy the error constraints, then Tis a valid choice. Otherwise, is determined to be an invalid choice.

[0079] It is noted that interval evaluations for specific small intervals may be convenient for performing a quick check and for generating candidate values of T for the range [Tmin„, Tm x n ]. Such specific small intervals may not cover the complete interval, resulting in the need to perform an interval evaluation for the complete interval. Evaluations for large intervals, however, may take longer due to the possibility of many interval splits, and may be more pessimistic.

[0080] Turning to FIG. 7, a flow diagram depicting an embodiment of a method for creating segments and their corresponding lookup values is illustrated. In various embodiments, the flow diagram of FIG. 7 may correspond to block 606 of the flow diagram depicted in FIG. 6. The method starts in block 701. A first segment of multiple segments may then be selected (block 702). [0081] The method may then depend on if the segment and its associated lookup value satisfy the error requirement (block 703). If the error requirement is satisfied, then the method may proceed, as described below, from block 708. If, however, the Error function does not result in a sufficiently small error for the parameters associated with the selected segment, then the selected segment may be divided in half (block 704). Dividing a segment in half roughly divides the relative error u for the segment, thereby reducing the value of the Error function as well.

[0082] A new lookup value may then be assigned for each new half segment (block 705). In various embodiments, the lookup value may be selected such that relative error for the segment is approximately symmetric around 0. The method may then depend on which segment is being evaluated (block 706). If the currently selected segment is the last segment, then the method may conclude in block 707. Alternatively, if the currently selected segment is not the last segment, then a next segment is selected (block 708) and the method may proceed from block 703 as described above.

[0083] It is noted that the embodiment depicted in the flow diagram of FIG. 7 is merely an example. In other embodiments, different operations and different orders of operations may be employed. [0084] When all of the segments have the same fixed upper and lower bounds, then segments may be merged in order to generate a new set of segments that includes less segments than the original set of segments. A flow diagram depicting an embodiment of method for merging segments is illustrated in FIG. 8. In various embodiments, the flow diagram of FIG. 8 may correspond to block 606 of the flow diagram depicted in FIG. 6. The method may begin in block 801.

[0085] A first pair of adjacent segments may then be selected (block 802). In various embodiments, each segment in the selected pair of segments may have keys that differ only in their least-significant bit. In other words, the lookup ranges of the two segments have a non-zero intersection.

[0086] The selected pair of segments may then be merged into a single segment (block 803). In some embodiments, the range of lookup values for the merged segment may be the intersection of the lookup ranges for the two unmerged segments. Since the error requirement is met for each of the unmerged segments, the error requirement will also be satisfied for the merged segment since the lookup value will be greater than the largest minimum value of the two unmerged segments and less than the smallest maximum value of the two unmerged segments. The method may then depend on if the selected pair is the last available pair (block 804).

[0087] If the selected pair is the last available pair, then the method may conclude in block 806. Alternatively, if addition segment pairs are available, then a next pair of segments is selected from the available set of segments (block 805). The method may then proceed from block 803 as described above. By merging segments in this fashion, the total number of segments may be reduced while still meeting the error requirements, thereby reducing the size of the lookup table. [0088] It is noted that the embodiment of the method illustrated in FIG. 8 is merely an example. In other embodiments, different operations and different orders of operations are possible and contemplated. [0089] The techniques described above may be applied to creating multiple lookup tables. An initial approximation for an iterative arithmetic operation may be generated using values from two different lookup tables. As shown in Equation 17, an initial approximation y may be generated by using values v and s from two different lookup tables by applying a multiplication and addition operation. As described below, J , is some trailing bits from address x.

[0090] The address x may be split into three sections (x = x y t) where x s is the address for one lookup table, x » x v is the address for the other lookup table. The relationship between the variables used to generate the initial approximation using two tables are depicted in Table 2.

[0091] Table 2: Variable Relationships

-Z? 1 ,Χ $ ΧγΧ( s = lookupS(x s ) v = lookupV(xsX v ) y = v + s *x t

T= 0. ly [0092] Turning to FIG. 9, a functional diagram depicting the use of two lookup tables is illustrated. The illustrated embodiment includes LookupV 901, LookupS 902, Multiplication Stage 903, and Addition and Truncate Stage 904. It is noted, that the embodiment depicted in FIG. 9 may correspond to the embodiment illustrated in FIG. 3, in some cases. The lookup values from LookupV 901 is v, and the lookup value from LookupS 902 is s. As described above, LookupV 901 is accessed using bits XsX v of B and LookupS 902 is accessed using bits x s . Bits x t may be multiplied by s in Multiplication Stage 903, and resultant product (s*x t ) may be added to v by Addition and Truncate Stage 904.

[0093] In various embodiments, LookupV 901 has at least as many rows as LookupS 902, since there are at least as many address bits for LookupV 901 as there are for LookupS 902. Access time for LookupV 901 may be at least that of LookupS 902. It is desirable to keep the number of bits included in x, as small as possible to reduce the time required to perform the multiplication operation in Multiplication Stage 903.

[0094] In order for y to be sufficiently accurate, the value for T = O.ly must satisfy the error requirement for the case of a single lookup table. This translates to the following condition: for each value of B = 1. XsXyX, included in [B w B n+ i), where 0 < n < N, and y = v + s*x, , then T= 0.\y and Tis an element of the interval [Tmin n , Tmax„].

[0095] Tables LookupV 901 and LookupS 902 must satisfy the above-referenced condition on T. Moreover, the sizes of LookupV 901 and Lookups 902 may be selected to be smaller than a single large lookup table. The total size of a single lookup table is Nx/, where N= 2 k and k = length(x) and / = lengthiy). The size of LookupS 902 may be given by 2 length ^ X p, where p is the length of entries in LookupS 902. The size of LookupV 901 may be given by 2 lenath(jCsXv x q , where q is the length of entries included in LookupV 901. [0096] Turning to FIG. 10, a flow diagram depicting an embodiment of a method for using two lookup tables is illustrated. The method begins in block 1001. A first lookup table may then be accessed to retrieve a first lookup value (block 1002). For example, in some embodiments, LookupV 901 may be accessed using bits x s and x v to retrieve value v. A second lookup table may then be accessed to retrieve a second lookup value (block 1003). For example, LookupS 902 may be accessed using bits x s of B to retrieve a value for s.

[0097] Using the first and second lookup values, a value for initial approximation may then be generated (block 1004). In various embodiments, the value for the initial approximation may be generated by multiplying bits x t of B by the value of s retrieved from LookupS 902. The resultant product may then be added to the value v retrieved from LookupV 901. The value of the initial approximation may then be generated by appending using the resultant sum as the decimal portion of T- 1.y. Once the value of the initial approximation has been generated, the method may conclude in block 1005.

[0098] Although the operations in the flow diagram of FIG. 10 are depicted as being performed in a sequential fashion, in other embodiments, one or more of the operations may be performed in parallel.

[0099] An example of a solution using two lookup tables is depicted in FIG. 1 1. In the illustrated example, there are 16 segments. Each choice of x s , x v , and x, determines a particular segment boundary B„ = 1 In the present example, x t includes 2 data bits and x s and x v each include a single data bit. Each of the 16 segments has a corresponding lookup range [Tmin„, Tmax„] from which lookup values may be selected. The error bars associated with each segment indicate the range of lookup values. It is noted that although the error bars are depicted as being the same size, in other embodiments, the error bars may be of different sizes. [0100] The lookup values for the 16 segments are obtained using two pairs of lines. Each pair of lines has the same slope, but different y-intercepts. The intersection of each line with an error bar for a particular segment yields the lookup value for that segment. It is noted that each of the lines intersect the error bars, indicating that points at the segment boundaries satisfy the error requirement. The present example illustrates that 16 lookup values may be determined for 16 segments using a linear combination of lookup values from two small lookup tables. For example, two entries included in LookupS 902 may correspond to the two slope values, and four entries included in LookupV 904 may correspond to the four y-intercept values. It is noted that since x, includes two data bits, a multiplication stage, such as, e.g., Multiplication Stage 903, may include a 2-by- multiplier.

[0101] It is noted that in some embodiments, if x t includes only a few data bits, the multiplication stage may be removed, and the product of s and x t may be stored in one of the lookup tables instead of just the values for s. The number of rows in the lookup table for the product of s and x t is 2 length(≠ times the number of rows in LookupS 902. With each added bit in x t , the size of the lookup table may double. It is noted that this is just one example of how the multiplication may be implemented when x t includes only a few data bits.

[0102] The sizes for the aforementioned lookup tables, LookupS and LookupV, may be determined by the sizes of the bit vectors x s and x v , respectively, and the number of bits in the individual entries in the lookup tables. Lengths of various vectors used in the determination of the sizes for the lookup tables are illustrated in Table 2. The relationship between the various lengths of the vectors is further illustrated in FIG. 12.

[0103] Table 3 Vector Sizes

KV = length{x t ) KS = length xvxi) k = lengthfasXvXt) p - number of bits in

entries in LookupV q - number of bits in

entries in LookupS

[0104] Referring to Table 3, a determination is made for each value is a value for KS that can be used to construct the two lookup tables. A further determination may be made as to which value of KS is the best value to use in the table construction. The sizes of the entries, p and q in the two tables may then be determined. For a given value of KV there may be multiple values of KS such that all entry values in the two lookup tables can be determined. In general, a larger value of KS may provide for a smaller combined size of the two lookup tables. It is noted that for each increment in KS, the size of the lookup table for s approximately decreases by a factor of two. Using the definitions in Table 2, the sizes of the various lookup tables may be determined as shown in Table 4.

[0105] Table 4 Sizes of Lookup Tables

Lookup Table Size

LookupT I2 k

LookupS P2 -KS)

LookupV q 2 (k-KV) [0106] Defining the quantity x = XsXyXt implies that for each choice of x there is a corresponding value of B„ since 1.x = B„. For each set of vectors x s and x v , there may be multiple choices for lookup values v and s, such that a pair (v, s) satisfies Equations 18 and 19 for all vectors x t .

Tmirin≤ floor + sx^

(18)

floor (v + sx t) ≤ Tmax n

[0107] Each choice of v and s corresponds to a linear approximation of a part of the curve, where v is the y-intercept and s is the slope. For a given x s and x v , each choice of x, corresponds to a segment boundary B„= l- ^x,. Equations 18 and 19 imply that the linear approximation must intersect the error bar, i.e., lookup value ranges, for each segment boundary.

[0108] For vectors x s and x v , if there is at least one pair (v, s) which satisfies Equations 18 and 19, then s mi „(x s , x v ) may be defined as the minimum value of s and s max (x s , x v ) may be defined as the maximum value of s of all possible pairs of (v, s). If there are no pairs (v, s) which satisfy Equations 18 and 19, then s max = +∞ and s max = -∞. The values for s mi „ and Smax may, in various embodiments, be determined using a linear optimization algorithm.

[0109] For example, for each x s the intersection, rangeS(x s ), of all intervals [s mi „(x s , Xv), s max (x s , *v)] may be computed for all vectors J v . If rangeS{x s ) is empty, then there is no lookup value for x s . Alternatively, if r ngeS x s ) is not empty, then any element from rangeS(x s ) may be selected as the lookup value for lookupS(x s ). Once the lookup value for lookupS(x s ) has been selected, a value v for lookupV(x v ) may be selected for each vector x v , such that (v, s) satisfies Equations 18 and 19 for all values of x t . It is noted that, because s is included in [s min (x s , x v ), s max (x s , x v )], the aforementioned value for v must exist.

[0110] For fixed values of KV and KS, if lookup values for x s and x v have been found, then lookup tables lookupS and lookupV ave also been found for this particular set of KV and KS. If, however, for some x s , there is no lookup value, then there are no lookup tables for this particular value of A and KS.

[0111] It is desirable to choose values for s and v with the least number of bits. A smaller bit width for s, decreases the bit-width of the multiplication stage, such as, e.g., Multiplication Stage 903, since the bit- width of the multiplication stage is a function of s and x,. A smaller bit- width for v may decrease the bit- width of the Addition and Truncation Stage, such as, e.g., Addition and Truncation Stage 904, which is determined by the bits included in v and the product of s and x t .

[0112] Although specific embodiments have been described above, these embodiments are not intended to limit the scope of the present disclosure, even where only a single embodiment is described with respect to a particular feature. Examples of features provided in the disclosure are intended to be illustrative rather than restrictive unless stated otherwise. The above description is intended to cover such alternatives, modifications, and equivalents as would be apparent to a person skilled in the art having the benefit of this disclosure.

[0113] The scope of the present disclosure includes any feature or combination of features disclosed herein (either explicitly or implicitly), or any generalization thereof, whether or not it mitigates any or all of the problems addressed herein. Accordingly, new claims may be formulated during prosecution of this application (or an application claiming priority thereto) to any such combination of features. In particular, with reference to the appended claims, features from dependent claims may be combined with those of the independent claims and features from respective independent claims may be combined in any appropriate manner and not merely in the specific combinations enumerated in the appended claims.