Proceedings 10th Asian Test Symposium
DOI: 10.1109/ats.2001.990304
|View full text |Cite
|
Sign up to set email alerts
|

A SmartBIST variant with guaranteed encoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
106
0
3

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 226 publications
(109 citation statements)
references
References 6 publications
0
106
0
3
Order By: Relevance
“…Most use special decompression hardware on the chip [2,3,9,10,12,16]. In this paper, we focus on software-based test data compression techniques that are applicable to deterministic test vectors since the test vectors for a core in a SoC are usually precomputed by the vendor.…”
Section: Introductionmentioning
confidence: 99%
“…Most use special decompression hardware on the chip [2,3,9,10,12,16]. In this paper, we focus on software-based test data compression techniques that are applicable to deterministic test vectors since the test vectors for a core in a SoC are usually precomputed by the vendor.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of compacting a set of test sequences for sequential circuits was modeled with the help of a covering matrix, where the test sequences can be modeled as columns with variable cost to reflect the cost (number of vectors) of covering selected subsets of circuit faults [6]. D-algorithm that is shown to be ineffective for the class of combinational logic circuits that is used to implement error correction and translation (ECAT) functions [11]. PODEM algorithm is a new test generation algorithm for combinational logic circuits.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the system integrator is restrained from using TDC methods which may require automated test pattern generation (ATPG) integration. For these reasons, in [11] the XOR − Network approach from [2] has been tailored for core based SoC test. In the remainder of this paper we will use the XOR − Network method as introduced in [11], and, in order to avoid confusion, we will refer to this particular implementation as XNet.…”
Section: Preliminaries and Motivationmentioning
confidence: 99%
“…TDC has been approached from a number of research directions. For example, methods which (i) exploit the sparseness of care bits in the test set have been proposed in [2,6,17], and methods which (ii) exploit the regularities within the test set have been proposed in [5,12,18,21].…”
Section: Introductionmentioning
confidence: 99%