We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Li Jintao, Min Yinghua. Product-Oriented Test-Pattern Generation for Programmable Logic Arrays[J]. Journal of Computer Science and Technology, 1990, 5(2): 164-174.
Citation: Li Jintao, Min Yinghua. Product-Oriented Test-Pattern Generation for Programmable Logic Arrays[J]. Journal of Computer Science and Technology, 1990, 5(2): 164-174.

Product-Oriented Test-Pattern Generation for Programmable Logic Arrays

More Information
  • Published Date: April 09, 1990
  • A Product-oriented test-pattern generation strategy for Programmable Logic Arrays(PLAs)is pres- ented.First the personality of products is discussed.Products are divided into several categories to speed up the test generation.This strategy aims at generating a very compact test set for crosspoint defects through the fol- lowing steps:1)generate special test vectors for each category of products at the beginning of test generation. Each vector is capable of detecting a great amount of crosspoint defects;2)ge…
  • [1]
    H.Fleisher and L.I.Maissel. An introduction to array logic, IBM J. Res. Develop., l9 (1975). 98-109.
    [2]
    Signetics Field Programmable Logic Array, Sunnyvale. CA: Signetics. Mar. 1976.
    [3]
    C.W.Cha, A testing strategy for PLAs, Proc. l5th Design Auto. Conf., 1978, 83-89.
    [4]
    E.J.Muelhdorf and T.W.Williams. Optimized stuck-fault test pattern generation for PLA macro. Dig. IEEE semiconductor test symp., Cherry Hill. Oct.1977, 88-101.
    [5]
    D.L.Ostapko and S.J.Hong, Fault analysis and test pattern generation for programmable logic arrays, IEEE Trans.on Compur.,C-28(1979). 617-626. ……….
  • Related Articles

    [1]Yong-Dong Zhang, Sheng Tang, Jin-Tao Li. Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication[J]. Journal of Computer Science and Technology, 2007, 22(4): 618-625.
    [2]Duo Liu, Ping Luo, Yi-Qi Dai. Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem[J]. Journal of Computer Science and Technology, 2007, 22(1): 92-94.
    [3]Xin-Yi Huang, Willy Susilo, Yi Mu, Fu-Tai Zhang. Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004[J]. Journal of Computer Science and Technology, 2007, 22(1): 71-74.
    [4]Yu-Chun Ma, Xian-Long Hong, She-Qin Dong, C. K. Cheng, Jun Gu. General Floorplans with L/T-Shaped Blocks Using Corner Block List[J]. Journal of Computer Science and Technology, 2006, 21(6): 922-926.
    [5]Hong-Bin Zhang, Cheng Yang, Xiao-Mei Quan. Image Authentication Based on Digital Signature and Semi-Fragile Watermarking[J]. Journal of Computer Science and Technology, 2004, 19(6).
    [6]LI JiGuo, CAO ZhenFu, ZHANG YiChen. Nonrepudiable Proxy Multi-Signature Scheme[J]. Journal of Computer Science and Technology, 2003, 18(3).
    [7]WANG ChangJie, ZHANG FangGuo, WANG YuMin. Secure Web Transaction with Anonymous MobileAgent over Internet[J]. Journal of Computer Science and Technology, 2003, 18(1).
    [8]LI Xianxian, HUAI Jinpeng. Efficient Non-Repudiation Multicast Source Authentication Schemes[J]. Journal of Computer Science and Technology, 2002, 17(6).
    [9]Guan Weiguang, Xie Lin, Ma Songde. Deformable Registration of Digital Images[J]. Journal of Computer Science and Technology, 1998, 13(3): 246-260.
    [10]Shen Li, Stephen Y.H.Su. Generalized Parallel Signature Analyzers with External Exclusive-OR Gates[J]. Journal of Computer Science and Technology, 1986, 1(4): 49-61.

Catalog

    Article views (20) PDF downloads (1216) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return