2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)最新文献

筛选
英文 中文
Towards interdependencies of aging mechanisms 衰老机制的相互依赖
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001394
H. Amrouch, Victor M. van Santen, T. Ebi, Volker Wenzel, J. Henkel
{"title":"Towards interdependencies of aging mechanisms","authors":"H. Amrouch, Victor M. van Santen, T. Ebi, Volker Wenzel, J. Henkel","doi":"10.1109/ICCAD.2014.7001394","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001394","url":null,"abstract":"With technology in deep nano scale, the susceptibility of transistors to various aging mechanisms such as Negative/ Positive Bias Temperature Instability (NBTI/PBTI) and Hot Carrier Induced Degradation (HCID) etc. is increasing. As a matter of fact, different aging mechanisms simultaneously occur in the gate dielectric of a transistor. In addition, scaling in conjunction with high-K materials has made aging mechanisms, that have often been assumed to be negligible (e.g., PBTI in NMOS and HCID in PMOS), become noticeable. Therefore, in this paper we investigate the key challenge of providing designers with an abstracted, yet accurate reliability estimation that combines, from the physical to system level, the effects of multiple simultaneous aging mechanisms and their interdependencies. We show that the overall aging can be modeled as a superposition of the interdependent aging effects. Our presented model deviates by around 6% from recent industrial physical measurements. We conclude from our experiments that an isolated treatment of individual aging mechanisms is insufficient to devise effective mitigation strategies in current and upcoming technology nodes. We also demonstrate that estimating reliability due to an individual dominant aging mechanism together with solely considering a single kind of failures, as currently is a main focus of state-of-the-art (e.g., [28], [22]), can result in 75% underestimation on average.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
On application of data mining in functional debug 数据挖掘在功能调试中的应用
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001424
Kuo-Kai Hsieh, Wen Chen, Li-C. Wang, J. Bhadra
{"title":"On application of data mining in functional debug","authors":"Kuo-Kai Hsieh, Wen Chen, Li-C. Wang, J. Bhadra","doi":"10.1109/ICCAD.2014.7001424","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001424","url":null,"abstract":"This paper investigates how data mining can be applied in functional debug, which is formulated as the problem of explaining a functional simulation error based on human-understandable machine states. We present a rule discovery methodology comprising two steps. The first step selects relevant state variables for constructing the mining dataset. The second step applies rule learning to extract rules that differentiates the tests that excite error behavior from those that do not. We explain the dependency of the second step on the first step and considerations for implementing the methodology in practice. Application of the proposed methodology is illustrated through experiments conducted on a recent commercial SoC design.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"25 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Large-signal MOSFET modeling using frequency-domain nonlinear system identification 基于频域非线性系统辨识的大信号MOSFET建模
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001418
Moning Zhang, Yang Tang, Zuochang Ye
{"title":"Large-signal MOSFET modeling using frequency-domain nonlinear system identification","authors":"Moning Zhang, Yang Tang, Zuochang Ye","doi":"10.1109/ICCAD.2014.7001418","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001418","url":null,"abstract":"Traditional BSIM MOSFET model extraction considers I-V/C-V curve fitting to capture DC non-linearity and S-parameter fitting to capture high-frequency small-signal behavior. This leads to poor accuracy when modeling MOSFETs in large-signal RF circuits such as power amplifiers, which require to model high-frequency large-signal behavior of MOSFETs. In this paper, we proposed an automatic method for automatically modeling high-frequency large-signal behavior for MOSFETs. The input is a pre-characterized MOSFET model and large-signal measurement data. The output is an enhanced model that model not only DC and S-parameter characteristics but also large-signal behavior. Experiments show that the proposed method can accurately capture both the nonlinear and dynamic behavior of RF MOSFET.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126074055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptoraptor: High throughput reconfigurable cryptographic processor Cryptoraptor:高吞吐量可重构密码处理器
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001346
Gokhan Sayilar, Derek Chiou
{"title":"Cryptoraptor: High throughput reconfigurable cryptographic processor","authors":"Gokhan Sayilar, Derek Chiou","doi":"10.1109/ICCAD.2014.7001346","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001346","url":null,"abstract":"This paper describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, which is designed to support both today's and tomorrow's symmetric-key cryptography algorithms and standards. To the best of our knowledge, the proposed cryptographic processor supports the widest range of cryptographic algorithms compared to other solutions in the literature and is the only crypto-specific processor targeting future standards as well. Our 1GHz design achieves a peak throughput of 128Gbps for AES-128 which is competitive with ASIC designs and has 25X and 160X higher throughputs per area than CPU and GPU solutions, respectively.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124595125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Design THINGS for the Internet of Things — An EDA perspective 面向物联网的设计——EDA视角
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001384
G. Qu, Lin Yuan
{"title":"Design THINGS for the Internet of Things — An EDA perspective","authors":"G. Qu, Lin Yuan","doi":"10.1109/ICCAD.2014.7001384","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001384","url":null,"abstract":"According to a recent article contributed by about a dozen high-profile EDA experts, \"the consensus is that in many aspects EDA is ready to provide tools required for loT implementation\" [1]. It is true that most of the THINGS in IoT do not need the most cutting edge technology and EDA tools may be ahead of the game. However, designing THINGS for IoT is not just about functionality, size, weight, speed, power, and time to market. It has a unique set of requirements that have not been considered during the development of today's EDA tools and design flow. In this paper, we study the challenges facing EDA community in designing THINGS for trust, security, privacy, and ultra-low power. We will also discuss how EDA and hardware can help to build better THINGS in terms of these criteria.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Modeling and analysis of nonstationary low-frequency noise in circuit simulators: Enabling non Monte Carlo techniques 电路模拟器中非平稳低频噪声的建模和分析:启用非蒙特卡罗技术
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001368
A. G. Mahmutoglu, A. Demir
{"title":"Modeling and analysis of nonstationary low-frequency noise in circuit simulators: Enabling non Monte Carlo techniques","authors":"A. G. Mahmutoglu, A. Demir","doi":"10.1109/ICCAD.2014.7001368","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001368","url":null,"abstract":"Modeling and analysis of low frequency noise in circuit simulators with time-varying bias conditions is a long-standing open problem. In this paper, we offer a definite solution for this problem and present a model for low-frequency noise that captures the internal, stochastic dynamics of the individual noise sources via dedicated internal pseudo nodes that are coupled with the rest of the circuit. Our method correctly incorporates the inherent nonstationarity of low-frequency noise into the device model and the circuit simulator. It is based on a probabilistic description of oxide traps in nano-scale devices that individually cause the so-called random telegraph signal (RTS) noise, and, en masse, are believed to be the culprits of other low-frequency noise phenomena, such as 1/f and burst noise. Our model captures the dependence of noise characteristics on the state variables of the circuit. Its simple yet precise mathematical formulation allows the utilization of well-established, non Monte Carlo techniques for nonstationary noise analysis. In one embodiment that we present in this paper, the proposed noise model is used to perform frequency-domain, non Monte Carlo, semi-analytical noise evaluation for circuits under periodic large-signal excitations. For this case, we verify that the computed noise spectral densities match the ones obtained via spectral estimation from timedomain Monte Carlo noise simulation data.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131254632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Triple patterning lithography aware optimization for standard cell based design 基于标准单元设计的三模光刻感知优化
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.5555/2691365.2691391
Jian Kuang, Wing-Kai Chow, Evangeline F. Y. Young
{"title":"Triple patterning lithography aware optimization for standard cell based design","authors":"Jian Kuang, Wing-Kai Chow, Evangeline F. Y. Young","doi":"10.5555/2691365.2691391","DOIUrl":"https://doi.org/10.5555/2691365.2691391","url":null,"abstract":"Triple Patterning Lithography (TPL) is regarded as a promising technique to handle the manufacturing challenges in 14nm and beyond technology node. It is necessary to consider TPL in early design stages to make the layout more TPL friendly and reduce the manufacturing cost. In this paper, we propose a flow to co-optimize cell layout decomposition and detailed placement. Our cell decomposition approach can enumerate all coloring solutions with the minimum number of stitches. Experimental results show that our approach can outperform the existing work in all aspects of stitch number, HPWL and running time.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Removing concurrency for rapid functional verification 消除并发性以实现快速功能验证
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001371
S. Longfield, R. Manohar
{"title":"Removing concurrency for rapid functional verification","authors":"S. Longfield, R. Manohar","doi":"10.1109/ICCAD.2014.7001371","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001371","url":null,"abstract":"VLSI systems are commonly specified using sequential executable functional specifications, but implemented in a highly concurrent manner. Alhough the methods to transform between the sequential specification and concurrent implementation have been well-studied, there are still substantial difficulties in verifying that the concurrent implementation corresponds to the sequential specification after low-level optimization. The majority of methods for doing this verification have focused on strong semantic models for reasoning about systems and their specifications, but these models can add significant unnecessary complexity. In this paper, we explore a weak but effective method for reasoning about implementation relations. We show how a sequential embedding of a concurrent program can be generated, and how that embedding can be used to dramatically reduce the reachable state space of the verification problem while maintaining the semantic model of interest.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UI-Timer: An ultra-fast clock network pessimism removal algorithm UI-Timer:一种超快速时钟网络悲观去除算法
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.5555/2691365.2691516
Tsung-Wei Huang, Pei-Ci Wu, Martin D. F. Wong
{"title":"UI-Timer: An ultra-fast clock network pessimism removal algorithm","authors":"Tsung-Wei Huang, Pei-Ci Wu, Martin D. F. Wong","doi":"10.5555/2691365.2691516","DOIUrl":"https://doi.org/10.5555/2691365.2691516","url":null,"abstract":"The recent TAU computer-aided design (CAD) contest has aimed to seek novel ideas for accurate and fast clock network pessimism removal (CNPR). Unnecessary pessimism forces the static-timing analysis (STA) tool to report worse violation than the true timing properties owned by physical circuits, thereby misleading signoff timing into a lower clock frequency at which circuits can operate than actual silicon implementations. Therefore, we introduce in this paper UI-Timer, a powerful CNPR algorithm which achieves exact accuracy and ultra-fast runtime. Unlike existing approaches which are dominated by explicit path search, UI-Timer proves that by implicit path representation the amount of search effort can be significantly reduced. Our timer is superior in both space and time saving, from which memory storage and important timing quantities are available in constant space and constant time per path during the search. Experimental results on industrial benchmarks released from TAU 2014 CAD contest have justified that UI-Timer achieved the best result in terms of accuracy and runtime over all participating timers.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Shielding and securing integrated circuits with sensors 带传感器的集成电路的屏蔽和保护
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) Pub Date : 2014-11-03 DOI: 10.1109/ICCAD.2014.7001348
D. Shahrjerdi, Jeyavijayan Rajendran, S. Garg, F. Koushanfar, R. Karri
{"title":"Shielding and securing integrated circuits with sensors","authors":"D. Shahrjerdi, Jeyavijayan Rajendran, S. Garg, F. Koushanfar, R. Karri","doi":"10.1109/ICCAD.2014.7001348","DOIUrl":"https://doi.org/10.1109/ICCAD.2014.7001348","url":null,"abstract":"An integrated circuit (IC) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) is envisioned to enable advanced supply chain hardware authentication and tracing capabilities. The suggested SHIELD is expected to be a ultra-lower power, minuscule electronic component that is physically attached to the host IC. This paper focuses on two important adversarial acts on SHIELD: physical reverse engineering and physical side-channel analysis. These attacks can be launched through mechanical or optical means and they can reveal and/or modify the confidential on-chip data or enable reverse-engineering of the design. For detection of these attacks and subsequent erasing of the sensitive data, sensors, erasure devices, and the relevant control circuitry need to be added to the SHIELD. We describe the device-level operation of the optical (photodetectors) and mechanical (nano- or micro-electromechanical switches) sensors and how they can be integrated within an IC to detect physical attacks. The operation of these micro/nano-scale sensors is unreliable due to environmental, operational, and structural fluctuations and noise. We outline system-level approaches to design a reliable countermeasure against physical attacks using unreliable sensors.","PeriodicalId":426584,"journal":{"name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信