Chapter 5 Combinational ATPG

Size: px
Start display at page:

Download "Chapter 5 Combinational ATPG"

Transcription

1 Chapter 5 Combinationa ATPG

2 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques

3 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of vectors for a set of target fauts Netist Faut ist ATPG Program Test vectors Backtrack statistics Aborted fauts Redundant fauts Undetected fauts

4 Components of An ATPG System if fauts remaining new vector generated Random pattern generator Faut simuator if fauts remaining Agorithmic pattern generator (ATPG) Simuation-based test generator To detect easiy detectabe fauts Find a fauts captured by current vectors Generate vectors for undetected fauts or prove them to be undetectabe 4

5 5 Revisiting Faut Coverage Faut efficiency (ATPG efficiency) Percentage of fauts being successfuy processed by a ATPG Proving a faut undetectabe testing the faut Undetectabe fauts can cause performance, power, reiabiity probems, etc. Fauts may be masked by undetectabe fauts. Faut coverage= # of detected fauts Tota # of fauts # of detected fauts Faut efficiency= Tota # of fauts- # of undetectabe fauts

6 Fuy V.S. Partiay Specified Patterns A fuy specified test pattern (every PI is either 0 or ) 0 0 0/ stuck-at 0/ A partiay specified test pattern (certain PI s coud be unknown) x x /0 stuck-at 0 /0 Appications of partiay specified test patterns Test compaction Finding pattern of best test power, deay, etc.

7 7 Test Compaction To reduce the number of test vectors as ong as we keep the same detectabe faut coverage. Test compaction is important for randomy generated patterns. Even for vectors generated by an ATPG, since the order of processing fauts wi decide which vectors are discovered first.

8 An Exampe of Different Vectors Detecting the Same Fauts Assume we know the vectors and their detectabe fauts If we start from f, we find v to detect (f, f3, f5). And then continue with f2. We find v2 to detect it. And for the remaining f4, we find v3 for detection. In tota, we need 3 vectors. f f2 f3 f4 f5 v x x x v2 x x x v3 x x x v4 x x x 8

9 An Exampe of Different Vectors Detecting the Same Fauts (cont.) With the same assumption If we order the fauts as f4, f2, f5, f3, f. For f4, we find v3 to cover (f3, f4, f5) And for f2, we find v2 or v4 to cover (f, f2) In tota, we ony need 2 vectors. f f2 f3 f4 f5 v x x x v2 x x x v3 x x x v4 x x x 9

10 0 Test Compaction Methods Use faut dictionary Find essentia vectors No other vector can test fauts covered ony by essentia vectors. Find minimum vectors to cover a rest fauts A NP-compete probem. Try different orders of input vectors in a faut simuator.

11 Other Test Compaction Methods Static compaction After a set of vectors has been generated Use D-intersection For exampe, t=0x t2=0x t3=0x0 t4=x0 after compaction: t3=00 t24=00 Dynamic compaction Process generated vectors on-the-fy After generate a test for a faut, choose a secondary target faut to be tested and try to test the second faut by don t cares (X) not assigned by the first faut.

12 2 Combinationa ATPG Test Generation (TG) Methods Exhaustive methods Booean Equation Structura Anaysis Impication Graph Miestone Structura ATPG Agorithms D-agorithm [Roth 967] 9-Vaued D-agorithm [Cha 978] PODEM [Goe 98] FAN [Fujiwara 983] Other advanced techniques

13 Exhaustive Test Generation Expore a possibe input combinations to find input patterns detecting fauts Compexity ~ O(n 2 no_pi ) Generate tests for the stuck-at 0 faut, a. a b a stuck-at 0 f c Inputs f fa

14 Booean Equation Method f = ab+ac, fa = ac a Ta = the set of a tests for faut a b = {(a,b,c) f fa=} = {(a,b,c) f*fa +f *fa=} c = {(a,b,c) (ab+ac)(ac)' + (ab+ac)'(ac) = } = {(a,b,c) abc'=} = { (0) }. a stuck-at 0 f The compexity is high with the computation of fauty function.

15 5 Booean Difference Method f fa= == (a=0) (f(a=0) f(a=)) for a stuck-at, or (a=) (f(a=0) f(a=)) for a stuck-at 0 Define Booean difference df/da=f(a=0) f(a=) Meaning any change at a can be observed at the outputs of f().

16 Exampe of Booean Difference with Faut at PIs a b a stuck-at 0 X f= ab + ac c df/da = f(a=0) f(a=) = 0 (b+c) = (b+c) Test-set for a s-a-0 = {(a,b,c) a (b+c)=} = {(x), (x)}. Faut activation requirement Faut sensitization requirement

17 7 Booean Difference for Interna Signas Cacuation Step : convert the function F into a new one G that takes the signa w as an extra primary input Step 2: df(x,, x n )/dw = dg (x,, x n, w)/dw w x x n... w F Free w x x n... x G

18 Exampe of Booean Difference with Interna Faut a b h stuck-at 0 X f= ab + ac c G(i.e., F with h foating ) = h + ac dg/dh = G(h=0) G(h=) = (ac ) = (a +c ) Test-set for h s-a- is { (a,b,c) h (a'+c')= } = { (a,b,c) (a'+b') (a'+c')= } = { (0xx), (x00) }. Test-set for h s-a-0 is {(a,b,c) h (a'+c')=} = {(0)}. For faut activation For faut sensitization 8

19 9 Chain Rue A B f C D G(f(A, B), C, D) {A,B} and {C,D} have no variabes in common f = AB and G = f + CD à dg/df = (C + D ) and df/da = B à dg/da = (dg/df) (df/da) = (C +D ) B An Input vector v sensitizes a faut effect from A to G iff v sensitizes the effect from A to f and from f to G

20 20 Test Generation Based on Structura Anaysis Important agorithms D-agorithm [Roth 967] 9-Vaued D-agorithm [Cha 978] PODEM [Goe 98] FAN [Fujiwara 983] Key techniques Find inputs to () activate, and (2) propagate the faut through sensitized paths to POs Branch and bounds

21 Structura Test Generation ATPG traverse circuit structures by the foowing process: More targets Pattern found? End No Yes Seect targets Make decisions Yes Correct resuts? No Deete previous decisions Which path to propagate faut? Which ine to assign vaue? How to activate faut? How to propagate faut? More decisions If no more decision to be deeted, seect new targets. 2

22 22 Common Concepts for Structura Test Generation Faut activation Set the fauty signa to either 0 or A ine justification probem Faut propagation Seect propagation paths to POs Inputs to the gates on the propagation paths are set to non-controing vaues if the inputs are not on the path. Side inputs are set to non-controing vaues. Mutipe ine justification probems Line justification Find inputs that force certain signas to be 0 or.

23 Exampes of Faut Activation and Propagation for Stuck-at Fauts Faut activated by inverting the signa vaue: d=. Faut propagation Faut propagated to f by e=0. Line justification To assign d=, we need (a b)=( ). To assign e=0, we need c=0. a b d stuck-at 0 X d= for faut activation f c e=0 for faut propagation 23

24 24 What are the Decision Points? On faut propagation We seect propagation paths to POs. Invove decisions on which paths to choose. On ine justification Given a signa to justify, we need to make a decision on which inputs to set. For exampe, to set the output of an OR gate to, we need to choose which input to set to. Backtrack If we make a wrong decision (guess), we return and erase the decision (, and make another one). A decisions are recorded.

25 25 Branch-and-Bound Search Test Generation is a branch-and-bound search Every decision point is a branching point If a set of decisions ead to a confict (or bound), a backtrack is taken to expore other decisions A test is found when () faut effect is propagated to a PO (2) a interna ines are justified Since the search is exhaustive, it wi find a test if one exists No test is found after a possibe decisions are tried Target faut is undetectabe

26 26 An Iustration of Branch and Bounds Assume a, b, and c are interna signas a 0 0 b 0 c Soution space with a=0, b=0 Soution space with a=0, b=, c=0 Soution space with a=0, b=, c= Soution space with a=

27 Decision on Faut Propagation Path d a b c G G5 f G6 f2 e G3 G4 Decision tree before we start: Faut activation G5 G5 or G6 G6 G=0 à {a=, b=, c=} à G3=0 Faut propagation through G5 or G6 Decision through G5: à d= à The resuting test is (X) Decision through G6: à G4= à e=0 à The resuting test is (x0) 27

28 Decisions On Line Justification a b c d e f h k Faut activationà set h to 0 Faut propagation à e=, f=à o=0 Faut propagation à q=, r= To justify q= à = or k= Decision: = à c=, d= à m=0, n=0 à r=0 à inconsistency at r à backtrack! Decision: k= à a=, b= p m n o To justify r= à m= or n= (àc=0 or d=0) à Done! q r Decision point s n= k= a=, b= r= q= backtrack m= = c=, d= à m=0, n=0 à r=0 c=0 (Success) 28

29 29 Impications Impications Computation of the vaues that can be uniquey determined Loca impication: propagation of vaues from one ine to its immediate successors or predecessors Goba impication: the propagation invoving a arger area of the circuit and re-convergent fanout Maximum Impication Principe Perform as many impications as possibe It heps to either reduce the number of probems that need decisions or to reach an inconsistency sooner

30 30 An Exampe of Impication to Infuence Decisions d a b c G2 G G5 f G6 f2 G3 G4 e Faut activation G=0 à {a=, b=, c=} à {G3=0, G2=0} à G5=0 Faut propagation through G6 ony Decision through G6: à G4= à e=0 à test pattern is (x0)

31 3 Miestone Structura Test Generation Methods D-agorithm [Roth 967] 9-Vaued D-agorithm [Cha 978] PODEM [Goe 98] FAN [Fujiwara 983] Other advanced techniques

32 The D-Agebra Aow the representation of the good and fauty behavior at the same time. Formay define/generate decision points in faut activation and propagation Introduce the symbo D in addition to 0,, x D = /0 (D º 0/) represents a signa which has vaue in faut-free circuit and 0 in the fauty circuit. D D D D D D D D D D D D D D D D D 0 0 D D Forward impication conditions for NOT, AND, OR in D-agebra 32

33 33 A Quick Overview of D- Agorithm A structura agorithm Use 5-vaue ogic (0,, X, D, D ) Try to activate and propagate faut to outputs first with interna justification. Then appy branch and bounds on ine justification probems.

34 34 Faut Activation Specify the minima input conditions which must be appied to a ogic eement to produce an error signa at its output. Stuck-at fauts at an AND output: Stuck-at-0 faut: D Stuck-at- faut: 0xD and x0d More compex faut mode, e.g., bridging fauts, gate type errors, can aso be modeed.

35 35 Faut Activation of Compex Faut Modes Appy the concept of Booean equation method List the set of input patterns for function F. F is the (oca) representation function of the faut site. () faut-free output=0 {F=0} (2) faut-free output= {F=} (3) fauty output=0 {F f =0} (4) fauty output= {F f =} {F=0} {F f =} or {F=} {F f =0} Exampe: 2-input AND gate output stuck-at {F=0}={00, 0, 0}, {F f =}={00, 0, 0, }, {F=}={}, {F f =0}={} {F=0} {F f =} = {00, 0, 0} {F=} {F f =0} = {}

36 36 Exampe of Compex Faut Modes Assume the faut is to change an AND gate to an OR gate {F=0}={00, 0, 0}, {F f =}={0, 0, }, {F=}={}, {F f =0}={00} {F=0} {F f =} = {0, 0} {F=} {F f =0} = {} Appy 0, we produce a 0/ (D ) at the output Appy 0, we aso produce a (D ) 0/.

37 37 D-frontiers and J-fontiers Two most important data structures in the D- agorithm. Both store a ist of gates. D-frontiers Where to choose the propagation paths. D-frontiers shoud not be empty during the search of test patterns. J-frontiers Where to perform ine justifications. J-frontiers wi be empty after a test pattern is found.

38 38 D-frontiers D-frontiers are the gates whose output vaue is X, whie one or more inputs are D or D. d a b c G D G5 X f G6 X f2 e G3 G4 Faut activation G=0 à { a=, b=, c= } à { G3=0 } Faut propagation can be done through either G5 or G6 D-frontiers={G5, G6}

39 J-frontiers J-frontier: is the set of gates whose output vaue is known (i.e., 0 or ), but is not impied by its input vaues. a b c d e f h Faut activationà set h to 0 Faut propagation à e=, f=à o=0 Faut propagation à q=, r= k p m n o We need to justify both q= and r=: J-frontiers={q, r}. q r s 39

40 40 D-drive Function The D-drive seects a gate in the D-frontier and attempts to propagate the D and/or D from its input(s) to its output by setting side-inputs to non-controing vaues. D D X To drive D to the output, we need to set the side-input to. D For more compex functions, we can use the truth tabe of 5-vaue ogics.

41 4 Impication in D-Agorithm Invove D and D in the impication. Basic principes are guided by the truth tabe of each ogic gate (compex ce). Exampes are given in the foowing pages.

42 42 Loca Impications considering D/D (Forward) Before After 0 x x 0 x 0 x 0 x a J-frontier={...,a } 0 0 a J-frontier={... } D' D x D-frontier={...,a } a D' D 0 D-frontier={... } a

43 43 Loca Impications considering D/D (Backward) Before After x x x x x J-frontier={... } a 0 x x a 0 J-frontier={...,a } x x

44 44 Backward oca Impication by Prime Cubes Prime Cubes A simpified form of truth tabe. Circe groups of 0 or in the Karnaugh map. a b f Prime cubes of AND b a a b f 0 x 0 x 0 0

45 45 Backward Impication for Compex Ces Find the prime cubes of the function f(a,b,c) = a c + b b 0 a 0 0 c a b c f 0 x 0 x x 0 x 0 x 0 0 In this exampe, if we want to justify f=0 and we know c=, then we aso obtain the backward impication of ab=x0

46 46 Checking Consistency Consistency check for 5-V ogic We might assign different requirements from different decisions. We have to make sure every signa have compatibe assignment in the circuit. 0 X D D 0 0 f 0 F F f F F X 0 X D D D F F D D F D F F D F D

47 47 Terminating Conditions for D- Agorithm Success: () Faut effect at an output (D-frontier may not be empty) (2) J-frontier is empty Faiure: () D-frontier is empty and faut is not at POs (2) No decision eft but J-frontier is not empty

48 Propagation Phase of the D- Agorithm Choose signas to activate faut No D-frontier eft Perform impication, and check consistency (D-drive) Seect a D-frontier and Propagate the faut Backtrack (remove impied signas) no Backtrack Consistent? (remove impied signas) Fai no yes Is there a D or D at PO? yes Line justification (next page) 48

49 Line Justification Phase Test generated no Any un-justified ine? J-frontier not empty yes Seect an un-justified ine, and choose inputs for the gate (record decisions) No aternative decisions Perform impication, and check consistency update J-frontier No decision eft, but J-frontier not empty Line justification faied Backtrack (remove ast decisions and impied signas recover J-frontiers) Consistent? no yes 49

50 50 D-Agorithm Exampe I2 I I4 I3 0 G G2 G3 0 sa D 0 G4 G5 G6 G7 D G9 D Faut activationà set G2 to 0 à I2=, I3=, D-Frontier={G5, G6}, J- Frontier={} Faut propagation à seect G5 à I=à G=0 à G4=, D-Frontier={G6, G9}, J-Frontier={} Faut propagation à seect G9 à G6=, G7=à I4=0, G3=0 à I4= (Contradictory) à propagation fais, backtrack to seect another D- frontier from {G6}.

51 5 D-Agorithm Exampe (Cont.) I2 G4 G 0 I G5 D sa G2 G9 D G6 D I4 G3 0 G7 I3 Faut propagation à seect G6 à I4=, G3=0, G7= D

52 9-Vaue D-Agorithm Logic vaues (faut-free / fauty) {0/0, 0/, 0/u, /0, /, /u, u/0, u/, u/u}, where 0/u={0,D'}, /u={d,}, u/0={0,d}, u/={d',}, u/u={0,,d,d'}. Advantage: Automaticay considers mutipe-path sensitization, thus reducing the amount of search in D-agorithm The speed-up is NOT very significant in practice because most fauts are detected through singe-path sensitization

53 Exampe: 9-Vaue D-Agorithm a b c 0/u 0/ u/ u/ g D d /u e u/ f u/ d' 0/u e' u/0 f' u/0 h i j u/ k u/ u/ m u/ D /u à / n D Faut activationà set a to 0/u à h=/u, D- Frontier={g} Faut propagationà seect g à b=u/, c=u/ àd-frontier={i, k, m} Faut propagationà seect i à d=/u à D- frontier={k, m, n} Faut propagationà seect n à h=; j, k,, m=u/ àj-frontier={j, k,, m} Justify j à e =u/0 à e=u/ (consistent) Simiary f=u/

54 54 Seecting Inputs for 9-Vaue D- Agorithm To derive the input test vector, we choose the vaues consistent with both faut-free and fauty circuits. A = (0/u)={0, D } à 0 B = (/u)={, D} à C = (/u)={, D} à D = (u/)={, D } à E = (u/)={, D } à F = (u/)={, D } à The fina vector (A,B,C,D,E,F) = (0,,,,, )

55 55 Probems with the D-Agorithm Assignment of vaues is aowed for interna signas Large search space Backtracking coud occur at each gate TG is done through indirect signa assignment for FA, FP, and LJ, that eventuay maps into assignments at PI s The decision points are at interna ines The worst-case number of backtracks is exponentia in terms of the number of decision points (e.g., at east 2 k for k decision nodes) D-agorithm wi continue even when D-frontier is empty Inefficient for arge circuits and some specia casses of circuits Exampe: ECAT (error-correction-and-transation) circuits.

56 56 ECAT Circuits A B H sa0 P C E F G J K L N M Q R Primitive D-cube: A = B =, H = D To propagate through P to output R One possibe choice is N = Q =, but this is impossibe. D-agorithm wi exhaustivey enumerate a interna signas to confirm that N = Q = is impossibe.

57 57 The Decision Tree A B H sa0 P C E F G J K L N M Q R J=,K=0 C=,E= Q = L=,M= F=,G=0 N = J=0,K= L=0,M=0 C=0,E=0 F=0,G= Justification impossibe

58 58 PODEM: Path-Oriented DEcision Making The test generation is done through a sequence of direct assignments at PI s Decision points are at PIs, thus the number of backtracking might be fewer Aso a structura agorithm Aso use 5-vaue ogic and D-frontiers. Aso a branch and bounds agorithm. In PODEM, to activate and propagate fauts, a series of objective ine justifications are seected (simiar to D- agorithm), but then each objective is backtraced to PIs and a forward simuation is used to perform impications and confirm consistency.

59 59 Search Space of PODEM Compete Search Space A binary tree with 2 n eaf nodes, where n is the number of PI s For exampe, {a, b, c, d} are PIs in the foowing binary tree a 0 b 0 b 0 0 c c 0 0 c 0 c d d d d d d d d F F F S F S F F

60 PODEM: Recursive Agorithm PODEM () begin If(error at PO) return(success); If(D-Frontier is empty) return(failure); /* terminating conditions*/ (k, v k ) = Objective(); /* choose a ine, k, to be justified */ (j, v j ) = Backtrace(k, v k ); /* choose the PI, j, to be assigned */ Impy (j, v j ); /* make a decision */ If ( PODEM() == SUCCESS ) return (SUCCESS); Impy (j, v j ); /* reverse vj */ If ( PODEM() == SUCCESS ) return(success); Impy (j, x); /* we have wrong objectives */ return (FAILURE); end 60

61 6 An Exampe PI Assignments in PODEM Assume we have four PIs: a, b, c, d. Decision: a=0 Decision: b=0 à fais Reverse decision: b= Decision: c=0 à fais Reverse decision: c= Decision: d=0 à fais Decision: d= à fais Backtrack: d=x Backtrack: c=x Backtrack: b=x Reverse decision: a= a 0 b b 0 Faiure c 0 Faiure d 0 Faiure Faiure

62 62 Objective() and Backtrace() Objective() Guide decisions to activate and propagate fauts. Lead to sets of ine justification probems. A signa-vaue pair (w, v w ) Backtrace() Guide decisions to ine justification. Backtrace maps a objective into a PI assignment that is ikey to contribute to the achievement of the objective Traverses the circuit back from the objective signa to PI s Invoves finding an a-x path from objective site to a PI, i.e., every signa in this path has vaue x A PI signa-vaue pair (j, v j ) No signa vaue is actuay assigned during backtrace!

63 63 Objective() Routine Objective() { /* The target faut is w s-a-v */ } if (the vaue of w is x) obj = (w, v ); ese { seect a gate (G) from the D-frontier; seect an input (j) of G with vaue x; c = controing vaue of G; obj = (j, c ); } return (obj); faut activation faut propagation

64 64 Backtrace() Routine Backtrace(w, v w ) { /* Maps objective into a PI assignment */ G = w; v = v w ; whie (G is a gate output) { /* not reached PI yet */ inv = inversion of G; /* inv= for INV, NAND, NOR*/ seect an input (j) of G with vaue x; G = j; /* new objective node */ v = v inv; /* new objective vaue */ } return (G, v); /* G is a PI */ }

65 65 Backtrace Exampe Objective to achieved: (F, ) a b X X X X X F= Backtrace find a=0; Forward simuate a=0 a b 0 X X F= F is sti x after we set a=0

66 66 Backtrace Exampe (Cont.) Objective to achieved: (F, ) a b 0 X X F= Backtrace find b=; Forward simuate b= a b 0 0 F= F=

67 67 Terminating Conditions Success: Faut effect seen at an output. Faiure: D-frontier is empty and faut is not at any POs.

68 Exampe: PODEM a b c 0 0/ g D d e 0 f X 0 d' e' f' X h i j 0 k X m X D n X Faut activationà set a to 0 à h=, D-Frontier={g} Faut propagationà seect g à b=, c= àdfrontier={i, k, m} Faut propagationà seect i à d= à D-frontier={k, m, n} Faut propagationà seect n à objective =(k, ) Backtraceà e=0 à e = à j=0 Empty D-frontier and faut not at PO Backtrack to e= à e =0 à j=, k=d

69 Exampe: PODEM (Cont.) a b c 0 0/ g D d e f 0 d' e' 0 f' 0 h i j k D m D D n D D-frontier={m, n} Faut propagationà seect n à objective =(m, ) Backtraceà f=0 à f = à =0 Empty D-frontier and faut not at PO Backtrack to f= à f =0 à =, m=d à n=d, success!!

70 70 Another PODEM Exampe: ECAT Faut activationà set H to à A=, B=, D- Frontier={P} A B C E F G H J K L M sa0 N Q P R Faut propagationà seect P à objective =(N, ) Backtraceà C= Backtraceà E= à J=0, L= Backtraceà F= Backtraceà G= à K=0, M= à N=0, Q= à P=D à R=D Note that there is no backtracking in this exampe.

71 7 Characteristics of PODEM A compete agorithm ike D-agorithm Wi find the test pattern if it exists Use of backtrace() and forward simuation No J-frontier, since there are no vaues that require justification No consistency check, as conficts can never occur No backward impication Backtracking is impicity done by simuation rather than by an expicit and time-consuming save/restore process Experimenta resuts show that PODEM is generay faster than the D-agorithm

72 The Seection Strategy in PODEM In Objective() and Backtrace() Seections are done arbitrariy in origina PODEM The agorithm wi be more efficient if certain guidance used in the seection of objectives and backtrace paths Seection Principe Principe : among severa unsoved probems, attack the hardest one Ex: to justify a at an AND-gate output Principe 2: among severa soutions for soving a probem, try the easiest one Ex: to justify a at OR-gate output The key is to quantitativey define hard and easy.

73 Controabiity As Guidance of Backtrace We usuay use controabiity to guide the seection. More detais wi be provided in Ch 6. Testabiity Anaysis. Objective (g, ) à choose path gàf for backtracing Two unsoved probems e= and f= Choose the harder one: f= (ower probabiity of being ). Objective (g, 0) à choose path gàf for backtracing Two possibe soutions: e=0 or f=0 Choose the easier one: f=0 (higher probabiity of being 0). a=/2 b=/2 e=3/4 g Probabiity of being c=/2 d=/2 f=/4

74 74 FAN Fanout-Oriented Test Generation Techniques to acceerate the test generation process Immediate Impications Unique sensitization Headines Mutipe backtrace

75 75 Immediate Impications A B C H K E J sa L PODEM FAN Initia objective L = 0 Initia objective L = 0 Backtrace to PI: B = 0 Set J = K = E = Impication: H =, K =, J = 0, L = J = à H = 0 à A = B = K = à C = 0 Fai à backtrack.

76 76 Unique Sensitization A B 0 G G2 D G3 D G4 D H C D E F Ony one path to propagate D on signa C to output H. Set a the off-path inputs to non-controing vaues. G =, E =, F =, A = à B = 0 PODEM Initia objective: set G to Backtrace to PI: A = 0 à assigning A = 0 wi ater bock the propagation of D

77 Head ines Output of fanout-free regions with PIs as inputs. Backtrace in FAN stop at headines. Reduce search space. Head ines bound ines A ine that is reachabe from at east one stem is said to be bound 77

78 78 Breadth-First Mutipe Backtrace A must be set to. 0 Both must be set to. 0 0 Set to 0 the input w/ easiest-to-contro to 0 input. PODEM s depth-first search is sometimes inefficient. Breadth-first mutipe backtrace identifies possibe signa conficts earier. Attempts to satisfy a set of objectives simutaneousy

79 79 Why Mutipe Backtrace? Drawback of Singe Backtrace A PI assignment satisfying one objective àmay precude achieving another one, and this eads to backtracking Mutipe Backtrace Starts from a set of objectives (Current_objectives) Maps these mutipe objectives into head-ine assignments that is ikey to Contribute to the set of objectives Or show that objectives cannot be simutaneousy achieved Mutipe objectives may have conficting requirements at a stem 0 0

80 Exampe: Mutipe Backtrace conficting stem A B A A2 0 E Consistent stem C E E2 G 0 H I= J=0 Current_objectives Processed entry Stem_objectives Head_objectives (I,), (J,0) (J,0), (G,0) (G,0), (H,) (H,), (A,), (E,) (A,), (E,), (E2,), (C,) (E,), (E2,), (C,) (E2,), (C,) (C,) Empty à restart from (E,) (E,) (A2,0) empty (I,) (J,0) (G,0) (H,) (A,) (E,) (E2,) (C,) (E,) (A2,0) A A,E A,E A,E A A A A C C C C C 80

81 8 Mutipe Backtrace Agorithm Mbacktrace (Current_objectives) { whie (Current_objectives f ) { remove one entry (k, v k ) from Current_objectives; switch (type of entry) {. HEAD_LINE: add (k, v k ) to Head_objectives; 2. FANOUT_BRANCH: j = stem(k); increment no. of requests at j for v k ; /* count 0s and s */ add j to Stem_objectives; 3. OTHERS: inv = inversion of k; c = controing vaue of k; seect an input (j) of k with vaue x; if ((v k inv) == c) add(j, c) to Current_objectives; ese { for every input (j) of k with vaue x add(j, c ) to Current_objectives; } } } (to next page)

82 82 Mutipe Backtrace (con t) } if(stem_objectives f ) { remove the highest-eve stem (k) from Stem_Objectives; v k = most requested vaue of k; if (k has contradictory requirements and k is not reachabe from target fauts) return (k, v k ) /* recursive ca here */ add (k, v k ) to Current_objectives; return (Mbacktrace(Current_objectives); } ese { remove one objective (k, v k ) from Head_objectives; return (k, v k ); }

83 83 FAN Agorithm FAN() // the target faut is f s.a.v begin if (f = x) then assign (f, v ) if Impy_and_check() = FAILURE then return FAILURE if (error at PO and a bound ines are justified) then begin justify a unjustified head ines return SUCCESS end if (error not at PO and D_frontier = Ø) then return FAILURE /* initiaize objectives */ add every unjustified bound ine to Current_objectives seect one gate (G) from the D-frontier c = controing vaue of G (to next page)

84 84 FAN agorithm (con t) for every input (j) of G with vaue x add (j,c ) to Current_objectives /* mutipe backtrace */ (i,v i ) = Mbacktrace(Current_objectives) Assign(i,v i ) if FAN() = SUCCESS then return SUCCESS Assign(i,v i ) /* reverse decision */ if FAN() = SUCCESS then return SUCCESS Assign(i,x) return FAILURE end

85 85 Advanced Concepts of ATPG Dominator ATPG Learning agorithms State hashing Satisfiabiity-based methods and Impication graphs

86 86 Dominators for Faut Propagation Before After unique D-drive anaysis X D X X X X D X X D X X Unique D-Drive Impication If every gates in D-frontier pass through a dominator (unique D-drive), we can set noncontroing vaues at other side-inputs, and propagate D/D further.

87 87 Learning Methods for ATPG Learning process systematicay sets a signas to 0 and and discover what other signa vaues are impied. Used extensivey in impication. Ex. a=àb=0, even a and b are not impied immediatey by gate reationship. Static earning Start the earning process before ATPG Dynamic earning Start the earning process in between ATPG steps when some signa vaues are known Costy process

88 Modus Toens for Learning Given PàQ is true We can derive ~Qà~P is true Exampe: P and Q are Booean statements ~Q means that Q is not true A D A D B F B 0 F C E C E (B=0) à (F=0) => ~(F=0) à ~(B=0) => (F=) à(b=) (Static Learning) When A= (B=) à (F=) => (F=0) à (B=0) (Dynamic Learning) 88

89 Constructive Diemma for Learning Given () P=>Q and R=>S, and (2) Either P or R is true Exampe: We can derive Either Q or S is true. Both [(a=0) => (i=0)] and [(a=) => (i=0)] are true. Either (a=0) or (a=) hods => (i=0) a=0 a= i=0 0 i=0 89

90 90 Modus Ponens for Learning Given F and F=>G are true We can derive G is true. Exampe: [a=0] and [(a=0) => (f=0)] => (f=0)

91 9 Recursive Learning From known signa vaues, try a possibe decisions (recursivey). If a certain signas have the same vaues among a decisions, they are impied vaues.

92 Exampe of Recursive Learning c d a b e f h g i=0 e2 f2 g2 k j= i=0 For i, try g=0 àe=0, f=0 e=0 For e, try a=0 àa2=0, e2=0 For i, try h=0 à=0 àk= f=0 For e, try b=0 àb2=0, e2=0 For f, try c=0 àc2=0, f2=0 For f, try d=0 àd2=0, f2=0 e2=0 f2=0 g2=0 à=0 àk= 92

93 93 State Hashing (EST) Records and compare E-frontiers E-frontiers are the cut between known signas and unknown parts. Given identica E-frontiers Previous impications can be used Or inconsistency can be deduced from the previous run.

94 State Hashing Exampe C= E=0 F=0 g B=0 h k A= m n Z C=0 E=0 F g B= h k A m n Z Step Input Choice E-frontier B=0 {B=D } 2 C= {C=, B=D } 3 E=0 {g=, m=d} 4 A= {g=, n=d } 5 F=0 {Z=D} Step Input Choice E-frontier C=0 {h=d } 2 B= {m=d} 3 E=0 {g=, m=d} Match found at step 3 Process for detecting B s-a- Test pattern = (CEFBA)=(000) Process for detecting h s-a- Test pattern = (CEFBA)=(000) 94

95 95 Impication Graph ATPG Transate circuits into impication graphs Use transitive cosure graph agorithm to perform ATPG Some decisions and impications are better assigned with graph agorithms. But experiences show that circuit structure is a very important information for ATPG. Satisfiabiity-based agorithms are currenty the fastest impementation for justification and commony appied to verification probems. We have a separate set of sides about SAT.

96 96 Transating Gate to its Equivaent Impication Graph Use NAND as an exampe A two-input NAND can be described competey by the foowing 3 equations. a àc b àc c àab Note that they cover a cubes. Impication graph Each node represents a signa variabe. If there is a directed edge from one node (v) to another (v2), v impy v2. a b c a c b a c b Equivaent impication graph for NAND.

97 Perform Impication on the Graph Assume we have c=0, we add an edge for càc càc == c +c == c Extra impication are found by tracing inked nodes. In this exampe, a àa and b àb, hence a=, b=. a b à a b a b c c 0 0 Truth tabe for impication aàb ==a +b 97

98 Impication Graph Exampes a b d F a b F a b F c e d e c d e c Equivaent Circuit Impication Graph a b F a b F a b F a b F d e c d e c d e c d e c Impication Graph d=0 New paths: a -d-d -a, F -d-d -F, b -d-d -b New conditions: a àa, F àf, b àb Impied ogic vaues: a=, F=, b= Impication Graph F= (i.e., de=0) New paths: b -d-e -b, b -e-d -b New conditions: b àb Impied ogic vaues: b= 98

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Preizkušanje elektronskih vezij

Preizkušanje elektronskih vezij Laboratorij za načrtovanje integriranih vezij Univerza v Ljubljani Fakulteta za elektrotehniko Preizkušanje elektronskih vezij Generacija testnih vzorcev Test pattern generation Overview Introduction Theoretical

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

UMBC. space and introduced backtrace. Fujiwara s FAN efficiently constrained the backtrace to speed up search and further limited the search space.

UMBC. space and introduced backtrace. Fujiwara s FAN efficiently constrained the backtrace to speed up search and further limited the search space. ATPG Algorithms Characteristics of the three main algorithms: Roth s -Algorithm (-ALG) defined the calculus and algorithms for ATPG using -cubes. Goel s POEM used path propagation constraints to limit

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

More Relation Model: Functional Dependencies

More Relation Model: Functional Dependencies More Reation Mode: Functiona Dependencies Lecture #7 Autumn, 2001 Fa, 2001, LRX #07 More Reation Mode: Functiona Dependencies HUST,Wuhan,China 152 Functiona Dependencies X -> A = assertion about a reation

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

l Some materials from various sources! n Current course textbook! Soma 1! Soma 3!

l Some materials from various sources! n Current course textbook! Soma 1! Soma 3! Ackwledgements! Test generation algorithms! Mani Soma! l Some materials from various sources! n r. Phil Nigh, IBM! n Principles of Testing Electronic Systems by S. Mourad & Y. Zorian! n Essentials of Electronic

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Automatic Program Inversion using Symbolic Transducers

Automatic Program Inversion using Symbolic Transducers Automatic Program Inversion using Symboic Transducers Qinheping Hu University of Wisconsin-Madison qhu8@wisc.edu Loris D Antoni University of Wisconsin-Madison oris@cs.wisc.edu Abstract We propose a fuy-automated

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

VLSI System Testing. Outline

VLSI System Testing. Outline ECE 538 VLSI System Testing Krish Chakrabarty Test Generation: 2 ECE 538 Krish Chakrabarty Outline Problem with -Algorithm POEM FAN Fault-independent ATPG Critical path tracing Random test generation Redundancy

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

VLSI Test Technology and Reliability (ET4076)

VLSI Test Technology and Reliability (ET4076) VLSI Test Technology and Reliability (ET476) Lecture 5 Combinational Circuit Test Generation (Chapter 7) Said Hamdioui Computer Engineering Lab elft University of Technology 29-2 Learning aims of today

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

CPE 628 Chapter 4 Test Generation. Dr. Rhonda Kay Gaede UAH. CPE Introduction Conceptual View. UAH Chapter 4

CPE 628 Chapter 4 Test Generation. Dr. Rhonda Kay Gaede UAH. CPE Introduction Conceptual View. UAH Chapter 4 Chapter 4 Test Generation Dr. Rhonda Kay Gaede UAH 1 4.1 Introduction Conceptual View Generate an input vector that can the - circuit from the one Page 2 1 4.1 Introduction Simple Illustration Consider

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4. If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

3.1 The cin Object. Expressions & I/O. Console Input. Example program using cin. Unit 2. Sections 2.14, , 5.1, CS 1428 Spring 2018

3.1 The cin Object. Expressions & I/O. Console Input. Example program using cin. Unit 2. Sections 2.14, , 5.1, CS 1428 Spring 2018 Expressions & I/O Unit 2 Sections 2.14, 3.1-10, 5.1, 5.11 CS 1428 Spring 2018 Ji Seaman 1 3.1 The cin Object cin: short for consoe input a stream object: represents the contents of the screen that are

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva)

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva) Eaton Bypass Power Modue (BPM) User s Guide For use with the foowing: Eaton 9155 UPS (8 15 kva) Eaton 9170+ UPS (3 18 kva) Eaton 9PX Spit-Phase UPS (6 10 kva) Specia Symbos The foowing are exampes of symbos

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

index.pdf March 17,

index.pdf March 17, index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS Artificia Inteigence and Language Processing ]acques Cohen Editor A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS LESLIE LAMPORT Over the past few years, I have deveoped an approach to the forma specification

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and. TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07

More information

Infinite Server Queueing Networks with Deadline Based Routing

Infinite Server Queueing Networks with Deadline Based Routing Infinite Server Queueing Networks with Deadine Based Routing Nea Master and Nichoas Bambos BCMP networks in the more genera framework of Key networks [8]. Key networks have been used and buit upon in severa

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

High Resolution Digital Crane Scale User Instructions

High Resolution Digital Crane Scale User Instructions BCS High Resoution Digita Crane Scae User Instructions AWT 35-501402 Issue AB Breckne is part of Avery Weigh-Tronix. Avery Weigh-Tronix is a trademark of the Iinois Too Works group of companies whose utimate

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Synchronization: Synchronization Needs Two synchronization needs Mutua excusion Whenever mutipe threads access a shared data, you need to worry

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University COS 318: Operating Systems Virtua Memory Design Issues: Paging and Caching Jaswinder Pa Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Virtua Memory:

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

PCT: Partial Co-Alignment of Social Networks

PCT: Partial Co-Alignment of Social Networks PCT: Partia Co-Aignment of Socia Networks Jiawei Zhang University of Iinois at Chicago Chicago, IL, USA jzhan9@uicedu Phiip S Yu University of Iinois at Chicago, IL, USA Institute for Data Science Tsinghua

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Product Design & Development

Product Design & Development Product Design & Deveopment Product Architecture 1 2 1 What is Product Architecture? Product architecture is the assignment of the product's functions to physica buiding bocks or "chunks". Product modue

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

Shape Analysis with Structural Invariant Checkers

Shape Analysis with Structural Invariant Checkers Shape Anaysis with Structura Invariant Checkers Bor-Yuh Evan Chang Xavier Riva George C. Necua University of Caifornia, Berkeey SAS 2007 Exampe: Typestate with shape anaysis Concrete Exampe Abstraction

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information