In-System Timing Extraction and Control Through Scan-Based, Test-Access Ports

نویسنده

  • André DeHon
چکیده

We present circuits and techniques which allow the extraction of fine-grained timing information using a simple, scan-based, test-access port such as the JTAG/IEEE 1149 standard. We go on to show how these techniques can be combined with other simple circuits for post-fabrication timing control. These techniques open up opportunities to perform timing oriented tests through TAP control. Further, they allow in-system timing adaptation which can be exploited to achieve high system performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

How to Care for Implanted Ports

Implantable ports are used for intravenous infusion therapy and play an important role in management of oncology patients. These ports are best suited for patients requiring long-term therapy (>4 weeks). Implanted ports provide reliable venous access protect peripheral access increase patients’ comfort through reducing repeated and difficult vein punctures allow for safe and comfortable admi...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

User-Friendly Access Control for Public Network Ports

We are facing a growing user demand for ubiquitous Internet access. As a result, network ports are becoming common in public spaces within buildings such as lounges, conference rooms and lecture halls. This introduces the problem of protecting these public ports from unauthorized use. In this paper, we study the problem of access control for public network ports. We view this problem as a speci...

متن کامل

An Implementation of IEEE 1149.1 to Avoid Timing Violations and Other Practical In-Compliance Improvements

An implementation of the IEEE 1149.1 standard (JTAG) is presented in this paper. Rules are given for removing gated clocks, registering of all the TAP controller outputs, and daisy-chaining the boundary-scan cell clocks, resets, and control signals in a direction opposite to that of TDI to TDO signal. Several major advantages are obtained as a result of these implementation rules. Timing issues...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994