Sciweavers

249 search results - page 5 / 50
» A secure scan design methodology
Sort
View
AGENTS
1999
Springer
13 years 11 months ago
A Methodology for Agent-Oriented Analysis and Design
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...
TCAD
1998
125views more  TCAD 1998»
13 years 7 months ago
Test-point insertion: scan paths through functional logic
—Conventional scan design imposes considerable area and delay overheads. To establish a scan chain in the test mode, multiplexers at the inputs of flip-flops and scan wires are...
Chih-Chang Lin, Malgorzata Marek-Sadowska, Kwang-T...
DFT
2005
IEEE
132views VLSI» more  DFT 2005»
13 years 9 months ago
Low Power BIST Based on Scan Partitioning
A built-in self-test (BIST) scheme is presented which both reduces overhead for detecting random-pattern-resistant (r.p.r.) faults as well as reduces power consumption during test...
Jinkyu Lee, Nur A. Touba
VTS
2007
IEEE
79views Hardware» more  VTS 2007»
14 years 1 months ago
Using Multiple Expansion Ratios and Dependency Analysis to Improve Test Compression
A methodology is presented for improving the amount of compression achieved by continuous-flow decompressors by using multiple ratios of scan chains to tester channels (i.e., expa...
Richard Putman, Nur A. Touba
DKE
2002
130views more  DKE 2002»
13 years 7 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber