Margin elimination through timing error detection in a near-threshold enabled 32-bit microcontroller in 40-nm CMOS
This paper presents a near-threshold operating voltage timing error detecting 32-bit
microcontroller system. The lightweight in situ error detection and correction technique uses …
microcontroller system. The lightweight in situ error detection and correction technique uses …
TG-SPP: A one-transmission-gate short-path padding for wide-voltage-range resilient circuits in 28-nm CMOS
Resilient circuits with timing error detection and correction (EDAC) can eliminate the excess
timing margin but suffer from the short-path (SP) issue where SPs must be padded to exceed …
timing margin but suffer from the short-path (SP) issue where SPs must be padded to exceed …
Negative Design Margin Realization through Deep Path Activity Detection Combined with Dynamic Voltage Scaling in a 55 nm Near-Threshold 32-Bit Microcontroller
RZ Yu, ZH Li, X Deng, ZL Liu - Sensors, 2023 - mdpi.com
This paper presents an innovative approach for predicting timing errors tailored to near-/sub-
threshold operations, addressing the energy-efficient requirements of digital circuits in …
threshold operations, addressing the energy-efficient requirements of digital circuits in …
A bi-directional, zero-latency adaptive clocking circuit in a 28-nm wide AVFS system
W Shan, W Dai, L Wan, M Lu, L Shi… - IEEE Journal of Solid …, 2019 - ieeexplore.ieee.org
Resilient circuits based on in situ timing monitoring adaptive voltage–frequency scaling
(AVFS) eliminate excess time margins caused by process, voltage, and temperature (PVT) …
(AVFS) eliminate excess time margins caused by process, voltage, and temperature (PVT) …
A Near-Threshold Spiking Neural Network Accelerator With a Body-Swap**-Based Error Detection and Correction Technique
Specialized architecture combined with near-and subthreshold voltage circuits emerges as
a promising candidate to improve the energy efficiency in performing complex computing …
a promising candidate to improve the energy efficiency in performing complex computing …
TICA: Timing Slack Inference and Clock Frequency Adaption Technique for a Deeply Pipelined Near-Threshold-Voltage Bitcoin Mining Core
This article presents a timing slack inference and clock frequency adaption technique,
named TICA, to mitigate the large and pessimistic timing guardband reserved for process …
named TICA, to mitigate the large and pessimistic timing guardband reserved for process …
In Situ Error Detection Techniques in Ultralow Voltage Pipelines: Analysis and Optimizations
W **, S Kim, W He, Z Mao… - IEEE Transactions on Very …, 2016 - ieeexplore.ieee.org
In order to achieve high tolerance against process, voltage, and temperature variations in
the ultralow voltage (ULV) circuits, in situ error detection and correction (EDAC) techniques …
the ultralow voltage (ULV) circuits, in situ error detection and correction (EDAC) techniques …
SERAD: Soft error resilient asynchronous design using a bundled data protocol
The risk of soft errors due to radiation continues to be a significant challenge for engineers
trying to build systems that can handle harsh environments. Building systems that are …
trying to build systems that can handle harsh environments. Building systems that are …
Near- and Sub- Pipelines Based on Wide-Pulsed-Latch Design Techniques
W **, S Kim, W He, Z Mao… - IEEE Journal of Solid-State …, 2017 - ieeexplore.ieee.org
This paper presents a methodology and chip demonstration to design near-/sub-threshold
voltage (Vt) pipelines using pulsed latches that are clocked at very wide pulses. Pulsed-latch …
voltage (Vt) pipelines using pulsed latches that are clocked at very wide pulses. Pulsed-latch …
Blacklist core: Machine-learning based dynamic operating-performance-point blacklisting for mitigating power-management security attacks
Most modern computing devices make available fine-grained control of operating frequency
and voltage for power management. These interfaces, as demonstrated by recent attacks …
and voltage for power management. These interfaces, as demonstrated by recent attacks …