Default Cover Image

2014 East-West Design & Test Symposium (EWDTS)

Sept. 26 2014 to Sept. 29 2014

Kiev, Ukraine

Table of Contents

Author indexFreely available from IEEE.pp. 1-1
ContentsFreely available from IEEE.pp. 1-5
[Title page]Freely available from IEEE.pp. 1-1
Hybrid history-based test overlapping to reduce test application timeFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A mathematical model for estimating acceptable ratio of test patternsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Method of free C++ code migration between SoC level tests and standalone IP-Core UVM environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Basic concept of linear synthesis of multi-valued digital structures in linear spacesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Using Java optimized processor as an intellectual property core beside a RISC processor in FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
The modeling of electromagnetic fields intensity in urban development conditionFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Testing of transport system management strategyFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
The input analog section of the ultrafast ADCsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Using metamodel of object system for domain-driven design the database structureFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Representation of solutions in genetic VLSI placement algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
SPICE model parameters extraction taking into account the ionizing radiation effectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Control vector structure for circuit optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Theory of bionic optimization and its application to evolutionary synthesis of digital devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An efficient signature loading mechanism for memory repairFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Partitioning of ECE schemes components based on modified graph coloring algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
On fuzzy expert system development using computer-aided software engineering toolsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Active-mode leakage power optimization using state-preserving techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Partially programmable circuit designFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Combinational part structure simplification of fully delay testable sequential circuitFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Microwave selective amplifiers with paraphase outputFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Self-testing checker design for incomplete m-out-of-n codesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Set covering on the basis of the ant algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Two-channel real-time steganographic systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Manufacturing scheduling problem based on fuzzy genetic algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Assessment of survivability of complex control systems using simulation methodsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
The impact of sensors' implementation on lift control systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Dual interpolating counter architecture for atomic clock comparisonFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Deriving complete finite tests based on state machinesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Neighborhood research approach in swarm intelligence for solving the optimization problemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Communication with smart transformers in rural settingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Temperature aware test scheduling by modified floorplanningFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Extending fault periodicity table for testing faults in memories under 20nmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Profiling of MES software requirements for the pharmaceutical enterpriseFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Malicious hardware: Characteristics, classification and formal modelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Selftest ADCs for smart sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Squaring in reversible logic using iterative structureFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Modified fast PCA algorithm on GPU architectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Discovering new indicators for botnet traffic detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Expert evaluation model of the computer system diagnostic featuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Combinational circuits without false pathsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
The levels of target resources development in computer systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Mobile health applications to support diabetic patient and doctorFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Video decompression technology in information and communication technologiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Qubit modeling digital systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Qubit method for diagnosing digital systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Repair of combinational unitsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Method for diagnosing SoC HDL-codeFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 77 out of 77