Abstract
Post-silicon clock-tuning
I. Introduction
(page 2)
(page 3)
II. Formulating Timing Constraints For a Single Chip
We begin this section by deriving the constraint equation
for a simple case of one single critical path
Assume that clock-tuning buffers (CTBs) drive the final
source and destination clock signals for any speed path.
(page 4 col 2)
(page 6)
Another important set of real-world issues occurs when
the constraint set has multiple solutions
Consider the scenario where a chip has two independent
paths (A and B), and path A is longer than path B by
150 time units.
Instead, we would prefer to avoid adjusting the CTBs
of any paths that do not factor in setting the frequency of
the chip.
Consider another related scenario, where we have only
one path in a chip that needs to be improved by 25
time units
Unfortunately, our heuristic of maximizing the number
of CTBs that are set to 0 time units does not work for this
scenario.
Another real-world issue that can be included is holdtime
constraints.
III. Constraints For Multiple Chips
So far we have constructed constraints for paths on
one chip.
(page 7)
IV. Satisfiability Modulo Theory (SMT)
V. Algorithm
A. Optimization Using Decision Problems
B. Methodology
Monday, August 30, 2010
Monday, August 23, 2010
paper 4.3 Capture Power Reduction Using Clock Gating Aware Test Generation
Abstract
Scan-based manufacturing test of low power designs often exceeds the very tight functional constraints on average and instantaneous logic switching.
This paper focuses on the management of instantaneous power during the capture phase. (comment: the scope)
1. Introduction
Test mode power can exceed the functional power specifications for several reasons cited below.
Delay tests that utilize “Launch off capture” transition approaches can cause voltage drop due to inductive effects as two high speed clock pulses follow a quiescent period.
[6] Y. Bonhomme, P. Girard, L. Guiller, C. Landrault, and S. Pravossoudovitch, “A gated clock scheme for low power scan testing of logic ICs or embedded cores,” Proc. Asian Test Symposium, 2001, pp. 253-258.
2. Previous Work
The proposed solution to these problems is to limit the clock activity in the capture cycles by imposing ATPG constraints on the enable signals of the clock gates.
3. Analysis of Capture Activity
(page 3)
4. Clock Gating ATPG Methodology
4.1. Locating Clock Gates in the Design
Synthesis support for clock gate insertion has become very sophisticated and current designs may contain within them coarse and/or fine grain clock gating as shown in Figure 6.
The process of identifying clock gates involves tracing back from the clock pin on each flop in the design. As each clock gate is encountered during such structural tracing, information is stored about the number of flops controlled by that clock gate.
5. Experimental Results
(page 7)
6. Ordering the Clock Gates
Scan-based manufacturing test of low power designs often exceeds the very tight functional constraints on average and instantaneous logic switching.
This paper focuses on the management of instantaneous power during the capture phase. (comment: the scope)
1. Introduction
Test mode power can exceed the functional power specifications for several reasons cited below.
Delay tests that utilize “Launch off capture” transition approaches can cause voltage drop due to inductive effects as two high speed clock pulses follow a quiescent period.
[6] Y. Bonhomme, P. Girard, L. Guiller, C. Landrault, and S. Pravossoudovitch, “A gated clock scheme for low power scan testing of logic ICs or embedded cores,” Proc. Asian Test Symposium, 2001, pp. 253-258.
2. Previous Work
The proposed solution to these problems is to limit the clock activity in the capture cycles by imposing ATPG constraints on the enable signals of the clock gates.
3. Analysis of Capture Activity
(page 3)
4. Clock Gating ATPG Methodology
4.1. Locating Clock Gates in the Design
Synthesis support for clock gate insertion has become very sophisticated and current designs may contain within them coarse and/or fine grain clock gating as shown in Figure 6.
The process of identifying clock gates involves tracing back from the clock pin on each flop in the design. As each clock gate is encountered during such structural tracing, information is stored about the number of flops controlled by that clock gate.
5. Experimental Results
(page 7)
6. Ordering the Clock Gates
Tuesday, August 17, 2010
paper 4.2 Accurate Measurement of Small Delay Defect Coverage of Test Patterns
Abstract
1. Introduction
2. Prior Work
2.1 Delay Test Coverage Metric
2.1.1 Shortcomings of DTC Metric
2.2 Statistical Delay Quality Level Metric
2.2.1 Shortcomings of SDQL Metric
(page 5)
3. Proposed SDD Test Coverage Metric
3.1 Quadratic SDD Test Coverage Metric
3.2 Faster-Than-At-Speed Testing
4. Experimental Results
4.1 Sensitivity to System Frequency
4.2 Sensitivity to Defect Distribution
4.3 Timing-Aware vs. Faster-Than-At-Speed
5. Conclusion
1. Introduction
2. Prior Work
2.1 Delay Test Coverage Metric
2.1.1 Shortcomings of DTC Metric
2.2 Statistical Delay Quality Level Metric
2.2.1 Shortcomings of SDQL Metric
(page 5)
3. Proposed SDD Test Coverage Metric
3.1 Quadratic SDD Test Coverage Metric
3.2 Faster-Than-At-Speed Testing
4. Experimental Results
4.1 Sensitivity to System Frequency
4.2 Sensitivity to Defect Distribution
4.3 Timing-Aware vs. Faster-Than-At-Speed
5. Conclusion
Monday, August 16, 2010
paper 4.1 Minimizing Outlier Delay Test Cost in the Presence of Systematic Variability
Abstract
I. INTRODUCTION
II. RELATED WORK
III. SVM OUTLIER ANALYSIS
A. Delay-Test Signature
B. Similarity Measures
C. One-Class Unsupervised Learning
D. Yield Parameter Selection
IV. EXPERIMENTAL SETUP
A. Setup Overview
B. Baseline Experiments
C. Cost Reduction
V. TEST COST MINIMIZATION
A. Minimizing Samples and Patterns
B. Entropy Measure
C. Single Clock Selection
D. Three Clock Selection
VI. METHODOLOGY
A. Preparation Phase
B. Application Phase
C. Implementation Practicality
VII. BENEFITS AND LIMITATIONS OF OUTLIER ANALYSIS
VIII. SUMMARY OF KEY FINDINGS
IX. CONCLUSION
I. INTRODUCTION
II. RELATED WORK
III. SVM OUTLIER ANALYSIS
A. Delay-Test Signature
B. Similarity Measures
C. One-Class Unsupervised Learning
D. Yield Parameter Selection
IV. EXPERIMENTAL SETUP
A. Setup Overview
B. Baseline Experiments
C. Cost Reduction
V. TEST COST MINIMIZATION
A. Minimizing Samples and Patterns
B. Entropy Measure
C. Single Clock Selection
D. Three Clock Selection
VI. METHODOLOGY
A. Preparation Phase
B. Application Phase
C. Implementation Practicality
VII. BENEFITS AND LIMITATIONS OF OUTLIER ANALYSIS
VIII. SUMMARY OF KEY FINDINGS
IX. CONCLUSION
Thursday, August 12, 2010
paper 2.4 Boundary-Scan Adoption – An Industry Snapshot with Emphasis on the Semiconductor Industry
Abstract
1. Introduction
2. The iNEMI Boundary-Scan Survey
2.1 Survey Objectives
2.2 Survey Methodology
3. Boundary-Scan Survey Results
3.1 Respondent Statistics
3.1.1 Board/System Test Engineering Respondent Demographics
3.1.2 Semiconductor Engineering Demographics
3.2 Boundary-Scan Standards and Initiative Knowledge and Support
3.2.1 Board/System Test Engineering Support for Boundary-Scan Standards and Initiatives
3.2.2 Semiconductor Engineering Support for Boundary-Scan Standards and Initiatives
3.3 Board/System Engineering Survey Results
3.3.1 How Important is Boundary-Scan to Board/System Test Engineers?
3.3.2 How Does Boundary-Scan Affect Product Development Time and Cost?
3.3.3 Using Boundary-Scan to Test Non-Boundary-Scan Devices
3.3.4 Verifying Semiconductor JTAG Compliance
3.3.5 Issues Encountered When Implementing Boundary-Scan
3.3.6 Attributes Important to Board/System Engineers When Choosing a Semiconductor Supplier
3.4 Semiconductor Engineering Survey Results
3.4.1 Current and Planned Support for Boundary-Scan in Semiconductor Devices
3.4.2 Factors Hindering Successful Implementation of Boundary-Scan in IC Designs
3.4.3 Target Applications for Semiconductor Designs
3.4.4 Boundary-Scan Compliance in Semiconductors
3.4.5 Boundary-Scan Verification in Semiconductors
3.4.6 Availability and Use of Extended Test Functions in Semiconductors
3.4.7 BSDL Files and Confidentiality
1. Introduction
2. The iNEMI Boundary-Scan Survey
2.1 Survey Objectives
2.2 Survey Methodology
3. Boundary-Scan Survey Results
3.1 Respondent Statistics
3.1.1 Board/System Test Engineering Respondent Demographics
3.1.2 Semiconductor Engineering Demographics
3.2 Boundary-Scan Standards and Initiative Knowledge and Support
3.2.1 Board/System Test Engineering Support for Boundary-Scan Standards and Initiatives
3.2.2 Semiconductor Engineering Support for Boundary-Scan Standards and Initiatives
3.3 Board/System Engineering Survey Results
3.3.1 How Important is Boundary-Scan to Board/System Test Engineers?
3.3.2 How Does Boundary-Scan Affect Product Development Time and Cost?
3.3.3 Using Boundary-Scan to Test Non-Boundary-Scan Devices
3.3.4 Verifying Semiconductor JTAG Compliance
3.3.5 Issues Encountered When Implementing Boundary-Scan
3.3.6 Attributes Important to Board/System Engineers When Choosing a Semiconductor Supplier
3.4 Semiconductor Engineering Survey Results
3.4.1 Current and Planned Support for Boundary-Scan in Semiconductor Devices
3.4.2 Factors Hindering Successful Implementation of Boundary-Scan in IC Designs
3.4.3 Target Applications for Semiconductor Designs
3.4.4 Boundary-Scan Compliance in Semiconductors
3.4.5 Boundary-Scan Verification in Semiconductors
3.4.6 Availability and Use of Extended Test Functions in Semiconductors
3.4.7 BSDL Files and Confidentiality
Monday, August 9, 2010
paper 2.3 Fast Extended Test Access via JTAG and FPGAs
Abstract
1. Introduction
2. State-of-the-Art in Boundary Scan
2.1 Test access via Boundary Scan
2.2 Boundary Scan speed considerations
2.3 Testing dynamic devices
3. FPGA-based TAM Extension
3.1 Alternative test data transport options
4. Experimental results
1. Introduction
2. State-of-the-Art in Boundary Scan
2.1 Test access via Boundary Scan
2.2 Boundary Scan speed considerations
2.3 Testing dynamic devices
3. FPGA-based TAM Extension
3.1 Alternative test data transport options
4. Experimental results
Wednesday, August 4, 2010
Paper 2.2 Intel®IBIST. the Full Vision Realized
Abstract
I. INTRODUCTION
II. RELATED WORK AND MOTIVATION
III. ARCHITECTURE OF IMPLEMENTATION
IV. ARCHITECTURE OVERVIEW
B. IBIST Registers and Register Organization
C. IBIST Test Execution Control
D. Programming Model
E. Application Auto-discovery
F Pattern Generation and Error Checking
G. Electrical Margining
H. Link State Machine Debug Support
V. ApPLICATIONS
A. Validation
B. Manufacturing
C. RAS
D. Remote Diagnostics
VI. EXPERIMENTAL RESULTS
VII. SUMMARY & CONCLUSIONS
I. INTRODUCTION
II. RELATED WORK AND MOTIVATION
III. ARCHITECTURE OF IMPLEMENTATION
IV. ARCHITECTURE OVERVIEW
B. IBIST Registers and Register Organization
C. IBIST Test Execution Control
D. Programming Model
E. Application Auto-discovery
F Pattern Generation and Error Checking
G. Electrical Margining
H. Link State Machine Debug Support
V. ApPLICATIONS
A. Validation
B. Manufacturing
C. RAS
D. Remote Diagnostics
VI. EXPERIMENTAL RESULTS
VII. SUMMARY & CONCLUSIONS
Subscribe to:
Comments (Atom)