A Systematic Approach for Optimized Bypass Configurations for Application-specific Embedded Processors Article uri icon