2009 Ph.D. Research in Microelectronics and Electronics 2009
DOI: 10.1109/rme.2009.5201304
|View full text |Cite
|
Sign up to set email alerts
|

Sub-threshold operation of a timing error detection latch

Abstract: Ajoitusvirheentunnistus (TED) mahdollistaa energian kulutuksen vähentämisen mikroprosessoreissa. Tässä diplomityössä on kaksi versiota ajoitusvirheentunnistavasta salvasta (esim. TDTBsubI ja TDTBsubII) ja systeemitason testipiiri (SystemTest), joka käyttää TDTBsub salpaa, mikä on suunniteltu toimimaan kynnysalueen alapuolella. Diplomityö esittelee ensin dynaamisen jännitteen skaalauksen (DVS), koska TED käytetään sellaisissa järjestelmissä. Seuraavaksi esitellään teoriaa kynnysalueen alapuolen suunnittelun haa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…From (2), it is seen that Qe,min is reached faster for this case since ITEDsc is larger. In previous designs [1], [2], [12], the uncertainty region is fully defined at design time, which is not feasible for weak inversion TED design. The second implication of having an adjustable Ir EDsc in TEDsc is that the size of A2 and A4 can be reduced by increasing ITEDsc for a given f CLK .…”
Section: Measurement Resultsmentioning
confidence: 99%
“…From (2), it is seen that Qe,min is reached faster for this case since ITEDsc is larger. In previous designs [1], [2], [12], the uncertainty region is fully defined at design time, which is not feasible for weak inversion TED design. The second implication of having an adjustable Ir EDsc in TEDsc is that the size of A2 and A4 can be reduced by increasing ITEDsc for a given f CLK .…”
Section: Measurement Resultsmentioning
confidence: 99%
“…One way to find out if an FF has caught true data, as Razor does, is comparing the data with a delayed clock data. Another way, however, is calculating if an incoming data has violated the setup and hold times of FF and, based on that, latching an erroneous data, as done in [37]. This idea is actually similar to Razor II [38] and has the same problem as Razor.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, there is a probability that metastability propagates through the error detection logic and causes metastability of the restore signal itself, which has been addressed in next versions by adding more circuitry like [39]. In [35] (which is an advanced form of [37]) a new FF is proposed that can handle both short and critical path errors and moreover the FF can recover critical path errors, like Razor, and also can predict short path errors. But this technique incurs a large area and is suitable for super-threshold voltages and it still has the same problem as discussed before.…”
Section: Discussionmentioning
confidence: 99%
“…Instead, these signals propagate to the control block, where they can be more easily handled. As far as we could verify, other than the seminal work presented in [5], only two works, [8] and [9], are available in literature that address the usage and design of TDTBs. However, none of these evaluated the sensitivity of the circuit to glitches, which we believe can jeopardize circuit functionality if not detected and signaled as errors.…”
Section: Introductionmentioning
confidence: 99%