Default Cover Image

2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)

Oct. 12 2015 to Oct. 14 2015

Amherst, MA, USA

Table of Contents

[Front matter]Freely available from IEEE.pp. i-xiv
Evaluating the impact of spike and flicker noise in phase change memoriesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fault detection and repair of DSC arrays through memristor sensingFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Asymmetric ECC organization in 3D-memory via spare column utilizationFull-text access may be available. Sign in or learn about subscription options.pp. 13-16
RotR: Rotational redundant task mapping for fail-operational MPSoCsFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacksFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Hot spare components for performance-cost improvement in multi-core SIMTFull-text access may be available. Sign in or learn about subscription options.pp. 53-59
Low-overhead fault-tolerance for the preconditioned conjugate gradient solverFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
On-line detection of intermittent faults in digital-to-analog convertersFull-text access may be available. Sign in or learn about subscription options.pp. 66-71
A Dual-Layer Fault Manager for systems based on Xilinx Virtex FPGAsFull-text access may be available. Sign in or learn about subscription options.pp. 72-75
REPAIR: Hard-error recovery via re-executionFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
A method to protect Bloom filters from soft errorsFull-text access may be available. Sign in or learn about subscription options.pp. 80-84
Using value similarity of registers for soft error mitigationFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
Reliable hash trees for post-quantum stateless cryptographic hash-based signaturesFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Chip-level anti-reverse engineering using transformable interconnectsFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Scan attack on Elliptic Curve CryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Enhancing embedded SRAM security and error tolerance with hardware CRC and obfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 119-122
A BIST approach for counterfeit circuit detection based on NBTI degradationFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Piecewise-functional broadside tests based on intersections of reachable statesFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
Predictive LBIST model and partial ATPG for seed extractionFull-text access may be available. Sign in or learn about subscription options.pp. 139-146
A CMOS ripple detector for integrated voltage regulator testingFull-text access may be available. Sign in or learn about subscription options.pp. 147-150
Adaptive fault simulation on many-core microprocessor systemsFull-text access may be available. Sign in or learn about subscription options.pp. 151-154
Compacting output responses containing unknowns using an embedded processorFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Impact of test compression on power supply noise controlFull-text access may be available. Sign in or learn about subscription options.pp. 161-166
Improving X-tolerant combinational output compaction via input rotationFull-text access may be available. Sign in or learn about subscription options.pp. 167-170
Low-power LDPC decoder design exploiting memory error statisticsFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Approximate compressors for error-resilient multiplier designFull-text access may be available. Sign in or learn about subscription options.pp. 183-186
Reducing the performance overhead of resilient CMPs with substitutable resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
Dependable real-time task execution scheme for a many-core platformFull-text access may be available. Sign in or learn about subscription options.pp. 197-204
Towards reliability and performance-aware Wireless Network-on-Chip designFull-text access may be available. Sign in or learn about subscription options.pp. 205-210
A cross-layer approach to online adaptive reliability prediction of transient faultsFull-text access may be available. Sign in or learn about subscription options.pp. 215-220
A configurable board-level adaptive incremental diagnosis technique based on decision treesFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobilesFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
Showing 44 out of 44