Proceedings International Test Conference 2001 (Cat. No.01CH37260)
DOI: 10.1109/test.2001.966618
|View full text |Cite
|
Sign up to set email alerts
|

Design of compactors for signature-analyzers in built-in self-test

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
28
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 69 publications
(28 citation statements)
references
References 8 publications
0
28
0
Order By: Relevance
“…So this style of spread network is called as "compacting spread network". The compression bound and synthesis are described in [1,12]. The design theorems of [1] cannot be directly used to our compactor since they do not consider the error cancellations in different cycles.…”
Section: Design Techniques Of Response Spread Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…So this style of spread network is called as "compacting spread network". The compression bound and synthesis are described in [1,12]. The design theorems of [1] cannot be directly used to our compactor since they do not consider the error cancellations in different cycles.…”
Section: Design Techniques Of Response Spread Networkmentioning
confidence: 99%
“…[11] presents an OPMISR technique which can double the number of scan chains using an on-product MISR. [12] presents a design technique of space compactor and MISR which can avoid the twoerror cancellation. However, the above two techniques do not have an effective way to eliminate the X bits in the scan chain whose outputs are not known during simulation.…”
Section: Introductionmentioning
confidence: 99%
“…A costly alternative would be inserting test points to mask x's right at their sources at the expense of area cost and performance degradation. Combinational compaction solutions, mostly XOR-based, are also utilized for response compaction [13,14,15,16,17,18,19]. Some of these techniques build the response compactor based on fault sensitization information under a particular fault model assumption [13,14,15,16,17], while response unknown bit and unmodeled defect coverage issues are overlooked.…”
Section: Introductionmentioning
confidence: 99%
“…Masking signals are transferred through tester channels and they are used to specify which scan chain outputs should be masked during which clock cycles. Many schemes for X-masking hardware design and mask control data compression have been developed [1]- [3], [11]- [14], [17], [19], [23]- [26]. In many cases, the resolution of the masking is reduced in order to keep the amount of mask data at reasonable levels (e.g., an entire scan chain or an entire scan slice may be masked).…”
mentioning
confidence: 99%