{"title":"用缓冲链法设计边界扫描及验证流程","authors":"E. Chae, H. Jun, Hyekyoung Song","doi":"10.1109/APASIC.1999.824089","DOIUrl":null,"url":null,"abstract":"Boundary scan is a well-known standard DFT technique, called IEEE Std 1149.1, that is designed with boundary scan registers placed between pads and internal logic. In this paper we propose a boundary scan design and verification flow using a buffer chain method. The advantages of the proposed flow include: (1) the buffer chain method is easy to implement using the Samsung in-house tool; (2) the flow is effective in solving the post-layout problems at the pre-layout step; and (3) the flow reduces the TAT (Turn Around Time) of the boundary scan design and verification.","PeriodicalId":346808,"journal":{"name":"AP-ASIC'99. First IEEE Asia Pacific Conference on ASICs (Cat. No.99EX360)","volume":"214 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Boundary scan design and verification flow using buffer chain method\",\"authors\":\"E. Chae, H. Jun, Hyekyoung Song\",\"doi\":\"10.1109/APASIC.1999.824089\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Boundary scan is a well-known standard DFT technique, called IEEE Std 1149.1, that is designed with boundary scan registers placed between pads and internal logic. In this paper we propose a boundary scan design and verification flow using a buffer chain method. The advantages of the proposed flow include: (1) the buffer chain method is easy to implement using the Samsung in-house tool; (2) the flow is effective in solving the post-layout problems at the pre-layout step; and (3) the flow reduces the TAT (Turn Around Time) of the boundary scan design and verification.\",\"PeriodicalId\":346808,\"journal\":{\"name\":\"AP-ASIC'99. First IEEE Asia Pacific Conference on ASICs (Cat. No.99EX360)\",\"volume\":\"214 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-08-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AP-ASIC'99. First IEEE Asia Pacific Conference on ASICs (Cat. No.99EX360)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APASIC.1999.824089\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AP-ASIC'99. First IEEE Asia Pacific Conference on ASICs (Cat. No.99EX360)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APASIC.1999.824089","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Boundary scan design and verification flow using buffer chain method
Boundary scan is a well-known standard DFT technique, called IEEE Std 1149.1, that is designed with boundary scan registers placed between pads and internal logic. In this paper we propose a boundary scan design and verification flow using a buffer chain method. The advantages of the proposed flow include: (1) the buffer chain method is easy to implement using the Samsung in-house tool; (2) the flow is effective in solving the post-layout problems at the pre-layout step; and (3) the flow reduces the TAT (Turn Around Time) of the boundary scan design and verification.