2009 15th IEEE Pacific Rim International Symposium on Dependable Computing 2009
DOI: 10.1109/prdc.2009.19
|View full text |Cite
|
Sign up to set email alerts
|

Built-In Self-Repair Techniques for Heterogeneous Memory Cores

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…However, selection of the faulty line with the largest fault count is the time‐consuming process, because it may need to pick more than one line for repair and have area overhead due to additional local bit map. In essential spare pivoting (ESP) [8, 9], the approach of finding of pivot rows and columns was sequential in nature. It is simple in implementation, which results in smaller area overhead than other RA – algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…However, selection of the faulty line with the largest fault count is the time‐consuming process, because it may need to pick more than one line for repair and have area overhead due to additional local bit map. In essential spare pivoting (ESP) [8, 9], the approach of finding of pivot rows and columns was sequential in nature. It is simple in implementation, which results in smaller area overhead than other RA – algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the yield of embedded memories dominates the whole chip's yield. In the past, fault replacement techniques [2][3][4][5][6][7][8][9][10][11] are usually used for repairing faulty memory cells. In other words, redundant rows/columns are used to replace faulty memory cells.…”
Section: Introductionmentioning
confidence: 99%
“…One promising solution to implement the fault replacement technique is the built-in self-repair (BISR) method. To achieve the goals of BISR, three basic modules including memory built-in self-test (BIST), built-in redundancy analysis (BIRA), and address reconfiguration (remapping) (AR), are usually required [2][3][4][5][6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%