2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) 2013
DOI: 10.1109/dft.2013.6653610
|View full text |Cite
|
Sign up to set email alerts
|

Online TSV health monitoring and built-in self-repair to overcome aging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…For online testing, injected test patterns to the TSV can be captured at the output and analyzed to find open defects using a NAND gate with logic threshold voltage [12]. Serafy et al [13] presented a lifetime reliability using a resistance tracking method and BIST to overcome the aging in TSVs. In [17], the authors proposed a test access point for injecting and collecting test vectors while Van der Plas et al [6] used a test pattern generator to test open TSV defects.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For online testing, injected test patterns to the TSV can be captured at the output and analyzed to find open defects using a NAND gate with logic threshold voltage [12]. Serafy et al [13] presented a lifetime reliability using a resistance tracking method and BIST to overcome the aging in TSVs. In [17], the authors proposed a test access point for injecting and collecting test vectors while Van der Plas et al [6] used a test pattern generator to test open TSV defects.…”
Section: Related Workmentioning
confidence: 99%
“…To localize the defective position, most systems use Builtin-self-test (BIST) [9], external testing [10], [11] and online testing [12], [13]. The mentioned works mostly focused on issuing test patterns and capturing them on a different terminal of a TSV to identify their healthiness.…”
Section: Introductionmentioning
confidence: 99%
“…It is unique in the following aspects. First, unlike previous intrusive methods [4] [5], it can operate independently without system support and will not interfere with system operation. Second, it can monitor the performance of targeted interconnects directly and continuously.…”
Section: Case Studiesmentioning
confidence: 99%
“…An intrusive method needs to halt the system operation periodically to perform the Built-In Self-Test (BIST) to decide if there is any sign of timing failure [4] [5]. To support this type of method, numerous delay test methods can be applied [6] [7][8] [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation