• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Time-Efficient Identification Method for Aging Critical Gates Considering Topological Connection

    2015-02-13 01:57:22TianSongYuHuaGuoLiangDaWenXuandLuShengWang

    Tian-Song Yu, Hua-Guo Liang, Da-Wen Xu, and Lu-Sheng Wang

    Time-Efficient Identification Method for Aging Critical Gates Considering Topological Connection

    Tian-Song Yu, Hua-Guo Liang, Da-Wen Xu, and Lu-Sheng Wang

    —The shrinking silicon feature size causes the continuous increment of the aging effect due to the negative bias temperature instability (NBTI), which becomes a potential stopper for IC development. As the basis of circuit-level aging protection, an efficient aging critical-gate identification method is crucially required to select a set of gates for protection to guarantee the normal lifetime of the circuits. The existing critical-gate identification methods always depend on a critical path set which contains so many paths that its generation procedure requires undesirable CPU runtime; furthermore, these methods can achieve a better solution with taking account of the topological connection. This paper proposes a time-efficient critical gates identification method with topological connection analysis, which chooses a small set of critical gates. Experiments over many circuits of ITC99 and ISCAS benchmark demonstrate that, to guarantee the normal lifetime (e.g., 10 years) of each circuit, our method achieves a 3.97x speedup and saves as much as 27.21% area overhead compared with the existing methods.

    Index Terms—Aging critical gates, negative bias temperature instability, topological connection.

    1. Introduction

    As the CMOS technology aggressively scales, the reliability degradation is emerging as a serious challenge for integrated circuits. The aging effect due to the negative bias temperature instability (NBTI) can cause more than 20% degradation of circuit performances at the worst case over a period of ten years[1]-[3], and it has become one of the most critical reliability concerns for digital circuits in the nanometre process[4],[5]. As aging becomes increasingly serious, several typical techniques, which include input vectors control (IVC)[6],[7], gate replacement (GR)[8], and adaptive voltage scaling (AVS)[9]-[11], were proposed to mitigate the aging effect. However, the efficiency of these techniques is restricted more or less by the process of aging critical gates (CGs) identification.

    Critical gates are the most important nodes for timing degradation in the lifetime of a circuit. The identification of CGs, as the basis of aging-protection techniques, which are crucial to enhance the reliability for high-performance integrated circuit, is key work for the reliable IC design. However, the existing methods of CGs identification all depend on critical paths set (CPS), which requires huge CPU runtime to generate the CPS due to the exponential explosion of the number of paths in the circuit[12], i.e., it takes more than ten hours to generate a critical path set for s15850[13],[14]. The CPS generation consumes so much CPU runtime that it would seriously extend the development cycle of digital chip design. Moreover, the existing CGs identification methods could be further optimized by considering the topological connection.

    As the CGs identification is critical work for mitigating circuit aging[6],[7],[15], several methods have been proposed. W. Wang et al. proposed an approach for CGs searching relied on CPS with handling each path in the CPS, and then the CGs could be abstracted[16]. Y. Cao et al. proposed a method for CGs identification based on the consideration of the node criticality in the circuit[17]. Both of them were required to generate CPS as an input, however, it was extremely time-dependent work for its exponential complexity, even in small-size circuits. Moreover, they did not take account of the topological connection.

    The correlated paths are mainly caused by the shared nodes in the circuit as illustrated in Fig. 1. The critical paths in the circuit are generally highly correlated, which means that amounts of them will share one or more gates[12],[13]. The topological connection among logic gates (TCLG) in circuits stands for whether two gates locate at the same paths (at least two paths). If two gates are at the same path, they have the topological connection. For example, G1 and G10 are on the same path. G1 can arrive at the G10 passing through several gates (G2 and G3) on different topological levels. But it cannot arrive at some gates such as G5, G6, and G7. Hence, the topological connection exists between G1 and G10. If two more paths are correlated, the topological connection appears among the shared gates. Suppose that there are six critical paths in a circuit, asshown in Fig. 1, it is evident that they are correlated with the shared node G10. Protecting G10 could mitigate the aging effect of the six critical paths but protecting other gates could not do. So the analysis of the shared gates seems to be crucial for the CGs identification in a circuit. However, so far, all the existing methods for identifying the CGs did not consider the topological connection of logic gates in the circuit, which was caused by the shared logic gates.

    Fig. 1. Example of correlated paths.

    In this paper, the TCLG in a circuit is analyzed and taken into account in the process of CGs identification. We propose a time-efficient method for CGs identification taking account of the circuit topological connection. The contributions of this paper can be summarized into the following aspects.

    · A time-efficient identification method for CGs is proposed with considering the circuit topological connection. It can abstract the specific gates set which has the most critical effect on the whole circuit.

    · An algorithm for CGs identification is proposed without depending on the CPS, which greatly reduces the searching time.

    The rest of this paper is organized as follows. Section 2 describes the related work. Section 3 gives the NBTI effect and models. Section 4 proposes our identification method for CGs. Section 5 shows our experimental results on ITC99 and ISCAS benchmark circuits. Section 6 gives the conclusions of this paper.

    2. Related Work

    CGs protection is the main approach for mitigating circuit aging. In [6] and [7], IVC techniques were proposed for aging protection. When the circuit was on standby mode, specific input vectors were applied to the circuit inputs to mitigate the aging effect. D. Bild et al. proposed an internal node control (INC) technique which could permit much more control of all levels in the circuit to decrease the NBTI-induced delay[18]. Y. Wang et al. proposed two gate replacement algorithms together with optimal input vector selection to reduce the leakage power and mitigate the NBTI-induced degradation[8]. Most of CGs in the circuit would be abstracted under protection in the standby mode by using gate replacement technique. Like the method proposed in [15], I. C. Lin et al. proposed a novel transmission gate-based technique to minimize the NBTI-induced degradation and leakage. It inserted a transmission gate and a pull up device in front of the critical gate, forcing one input of the critical gate to a high level in the standby mode to mitigate the static NBTI effect.

    Fig. 2. CGs identification flow.

    All the techniques mentioned above illustrate that the CGs identification is the most critical basis for mitigating the circuits aging. Fig. 2 shows the principal steps of the existing CGs identification methods. W. Wang et al. proposed an efficient CGs identification method relying on CPS[16]. Firstly, the static timing analysis (STA) was applied into an original circuit without considering the NBTI. Given the timing constraint for the circuit paths, the potential critical paths (PCPs) could be abstracted. Moreover, the CPS would be obtained from the PCPs with considering the NBTI effect. The CGs could be abstracted by making every path in the CPS meet the timing requirement by using the gate replacement technique.

    In [17], the node criticality computation for circuit timing analysis was proposed. It defined the node criticality for the logic gate in the circuit. The potential critical paths were obtained by STA just like in [16]. The longest path in PCPs was called the most critical path (MCP). Given a node ni, two different node criticality computations were defined based on whether the node located at the MCP or not. After finishing the criticality computations for all gates, they were ordered according to the degree of their degradations. The CGs could be also abstracted by optimizing the circuit using gate replacement technique.

    Fig. 3. CGs identification for correlated paths.

    The method in [16] was the primary approach for CGs identification. Unfortunately, it did not take the TCLG into consideration in the circuit, which could make some critical paths over protected and the CPU runtime for the CPS generation extremely huge. As an example for CGs identification for correlated paths illustrated in Fig. 3, there are four critical paths in the circuit: {P1: G1->G2->G3->G4->G10->G11, P2: G1->G2->G3->G4->G8->G9, P3: G5->G6->G7->G4->G8->G9, P4: G5->G6->G7->G4->G10->G11}. We assume that G3 and G11 are the critical gates in the path P1 abstracted using the method in [16]. Two paths may share the same gate and wire. As shown in Fig. 3, P1 shares gate G4 with P2. Once G4 becomes a critical gate in the path P2, P1 would be over-protected. As amounts of the correlated paths exist in the circuit, mitigating the aging effect by replacing thecritical gates which are generated by the method in [16] could make some critical paths over-protected. Moreover, the CPS generation is an extremely time-consumed work.

    In this paper, a novel CGs identification method considering the TCLG (CGIMT) is presented. Unlike the existing methods, this approach can efficiently capture the impact of the topological correlation among the logic gates in the circuit for CGs identification.

    3. NBTI Effect and Models

    When a negative bias voltage (Vgs= -Vdd) is applied to a PMOS device, causing a shift in the threshold voltage, the NBTI effect occurs. On the contrary, when a positive bias voltage (Vgs=0) is applied to the PMOS device, the shifted Vth could be partly recovered. Fig. 4 shows the two conditions of a PMOS device with different Vgs[19].

    Fig. 4. Cross section of a PMOS decice under two conditions: (a) stess and (b) recovery.

    NBTI stress: When the gate voltage Vgof the PMOS transistor applies a low level (Vgs= -Vdd), it is on the stress condition. At this time, holes from the inversion layer can break the Si-H bonds, creating interface traps and neutral H atoms. Then, the H atoms convert into H2molecules. When H2molecules diffuse away, interface traps are left. When interface traps accumulate between silicon and the gate oxide interface, they cause a shift in the threshold voltage.

    Recovery: In the recovery phase, when the biased voltage is removed, the reverse reaction is performed. Some hydrogen diffuses back toward the interface and bonds with Si, which reduces the number of interface traps and the NBTI effect. Although the recovery phase can reverse the NBTI effect, it does not eliminate all the interface traps generated during the stress phase, and the PMOS threshold voltage will increase in the long term.

    S. Bhardwaj et al. proposed a long term model which provided an accurate and efficient estimate of the long term threshold voltage degradation of the PMOS due to the NBTI[4]. The voltage variation of a PMOS transistor ΔVth due to the NBTI at time t can be expressed as

    where n is the time exponent, Kvis a constant related to device parameters, Tclkis the clock cycle, α is the duty cycle (i.e., the ratio of total stress time to total operating time). βtis a time-dependent parameter expressed as follow:

    where ξ1, ξ2, and C are constants, toxis the oxide thickness of the PMOS device, t is the working time, and teis a constant determined by the working time.

    Parameters variation of PMOS devices caused by the NBTI effect will lead to the augment of gate delay. Meanwhile, the delay of data paths would increase and timing violation occurs when the delay increases to a certain threshold value. Y. Cao et al. proposed a gate delay computing model based on the long term NBTI prediction model. It is expressed as

    where a0iis the intrinsic delay of the gate without NBTI effect and a1iis a constant, these two parameters can be obtained by Hspice simulation. In this work, we use a 65 nm PTM[20]model in Hspice simulation to extract the delay information for different style gates at a discrete time unit. By fitting the simulation results with (3), we can get the coefficient values for a0iand a1i.

    4. CGs Identification Approach

    This section demonstrates that our CGs identification method is different from the existing methods. Its framework is illustrated in Fig. 5 which demonstrates the main steps for the proposed scheme. The PCGs and CGs generation are described in Sections 4.2 and 4.3. Finally, an algorithm is proposed to capture the impact of the topological connection among the logic gates in the circuit for CGs identification.

    4.1 Framework of CGIMT

    In this paper, there are three steps for the CGs identification as shown in Fig. 5.

    Step 1 (PCGs generation): In this step, we parse the given circuit and then get its topological structure. And then we set the intrinsic delay and delay degradation to be a certain value respectively for every gate in the circuit. As we know, the signal probability α is an important parameter for the circuit aging prediction when the work time is a constant. In [16], the path delay degradation was expressed as a function of α. To make a path get the worst delay degradation, a certain value of α could be calculated. But itseems to be not impractical. In [21], all the gates were stressed with the signal probability fixed as 0.95 to predict the circuit aging. However, it seems to be pessimistic. The signal probability was set to be 0.5 in [22] and [23] for all gates in the circuit. In this paper, we fix α as 0.5 with NBTI-stress for ten years. After analysing the aging state of every gate in the circuit, PCGs could be generated.

    Fig. 5. Framework of the CGIMT.

    Fig. 6. CGs generation considering TCLG: (a) PCGs, (b) analysis of the PCGs, and (c) gates for replacement.

    Step 2 (get the gates for replacement): After the PCGs generation is finished in Step 1, the connections among the gates in PCGs should be abstracted. And then the new topological structure for PCGs would be obtained. We can get the gates for replacement by the proposed algorithm with considering TCLG.

    Step 3 (aging test and CGs generation): After replacing the abstracted gates, a new netlist of circuit will be generated. Then aging test would be applied to the new circuit. If the aging test is successful, the replaced gates are aging critical gates.

    4.2 PCGs Generation

    After parsing the given circuit, its topological structure is obtained and the aging parameter of every gate could be initialized. Suppose that Gi is a gate in a given circuit, the processes of PCGs generation are introduced as follows.

    We can abstract the longest path Pi which contains Gi in a high speed as the circuit is on topological sort. By travelling the circuit forward and reverse, the delay degradation Tiand the intrinsic delay tiwithout considering NBTI of Pi could be obtained. Additionally, the maximum intrinsic delay for all paths in the circuit expressed as D0could be acquired. Supposed that q% is timing margin, the slack of Pi can be expressed as (1+q%)-ti. Furthermore, the delay degradation contribution Cvof Gi for Pi can be computed by CV=ΔdGi/slack, where ΔdGiis the delay degradation of Gi. If the inequation Ti>D0(1+q%) and Cv>p% are simultaneously satisfied, Gi would be put into PCGs. After dealing with all the gates in circuit, PCGs generation is finished.

    In this work, Pw is the path which has the maximum delay degradation among all the longest paths in the circuit. Then, we can give a solution for computing the value of p% expressed as following

    where Dagingis the aging delay while Dwis the intrinsic delay of Pw, and N is the gates number of Pw.

    4.3 CGs Generation

    As the PCGs generation has been finished in Section 4.2, every gate Gi in the PCGs has two features: One is that the longest path Pi which contains Gi experiences timing violation and the other is that it ages seriously. In this part, we abstract the critical gates from the PCGs with considering topological connection among the gates by utilizing the proposed algorithm.

    Fig. 6 illustrates the workflow of CGs generation. Suppose that the PCGs contains nine gates, as shown in Fig. 6 (a), all of them seem to be individual. Actually, the topological connections exist among the potential critical gates and we characterize them by the dotted lines as demonstrated in Fig. 6 (b). Then the topological connections among the potential critical gates can be easily understood from Fig. 6 (b). For example, the gate a could arrive at the gate c passing though amounts of logic gates (do not appear in Fig. 6 (b)) on different topological levels.

    Moreover, one gate would have different criticality for aging degradation in a circuit. As illustrated in Fig. 6 (b), the gate e which connects with all the gates in the PCGs seems to be more crucial to the whole circuit than others. Additionally, the gates c and g have the same feature. We can abstract a series of gates as shown in Fig. 6 (c) for replacing by analysing this feature. After the aging test receives a success, the critical gates could be obtained. As the TCLG is a crucial factor identifying the CGs mentioned above, we define the criticality for the gates in the PCGs expressed as

    where TMGiis a parameter evaluating the degree of topological connection for Gi in PCGs, ΔdGiis the delay degradation for Gi. The Gi is more critical with a bigger WGicompared to other gates.

    Fig. 7. CGs identification algorithm.

    In order to extract the CGs from PCGs, an algorithm with considering the TCLG is presented as illustrated in Fig. 7. Firstly, we define a parameter TM for every gate in the PCGs and initialize it with an initial value 0 (lines 1-3). After initializing the PCGs, we would obtain the TM for all the gates in the PCGs (lines 4-5). For each gate gi, we search every gate Gj that gi can arrive at (lines 6-7). As for Gj, if it can be found in the PCGs (suppose that gj is the gate), both the TM of gi and gj would plus 1 (lines 8-10). Afterwards, we can upload the delay degradation and the Wgifor every gate in the PCGs (lines 11-13). Furthermore, we sort the gates in the PCGs by the value Wgi(line 14). We replace the gate with a bigger Wgiand store them in the CGs after finishing the circuit aging protection (lines 16-19).

    Complexity: In this algorithm, as each gate in the original circuit is evaluated by the topological order, the complexity is O (M×N), where M is the number of PCGs and N is the total number of the circuit gates.

    5. Experiments

    5.1 Implementation

    In this paper, we implement the CGs identification algorithm by C++ in VS2010. The intrinsic delay a0iand the coefficient a1iin (3) are fitted by HSPICE simulation. The experiments are applied to nine benchmark circuits from ITC99 and ISCAS. The time margin is set to be 7%. The circuit lifetime is set to 10 years. Some critical technology parameters are: Vdd=0.9 V, |Vth|=0.365 V for both PMOS and NMOS transistors, the thickness of oxide tox=1.2 nm. The active time temperature T is set as 378 K.

    5.2 Results and Discussion

    The accuracy of aging analysis is an important target for aging prediction. In order to prove the accuracy of our proposed scheme, we assign l000 random input vectors to the circuit to simulate the “real” aging-induced degradation. And then we compare our prediction and existing prediction on circuit aging with the real aging prediction (RAP). We analyse 100 critical paths chosen in random from each experimental circuit and utilize their aging conditions to characterize the aging state of each circuit approximately. Fig. 8 shows the experimental results on nine benchmark circuits from ITC99 and ISCAS. Experimental results show that our scheme could achieve a better matching compared with RAP than the method in [16]. The difference between our scheme and the RAP is less than 0.32% on average as illustrated in Fig. 8.

    Fig. 8. Aging prediction for circuits.

    Fig. 9 demonstrates the number of CGs generated by the method in [16] and the method proposed in this paper with the timing margin q% obtaining the same value. As shown in Fig. 9, with taking the TCLG into account, the number of CGs generated by our method is less than that in [16]. Experiments in Fig. 8 also illustrate that the number of the critical gates generated by the CGIMT is less than 33.82% compared with the [16] on average.

    Even though our scheme can abstract less number of critical gates, the area overhead may be unacceptable. The area overhead stands for the area increment of the circuit after replacing the critical gates. In order to clarify this problem, we evaluate the area overhead of them. Fig. 10 is the evaluation results of the area overhead on the experimental circuits. Experimental results of the area overhead on the benchmark circuits reveal that our method can save as much as 27.21% area on average.

    Moreover, the CPU runtime, as illustrated in Fig. 11, has greatly induced compared with the method in [16]. Because of the CPS generation is high time-consumed work, the average CPU runtime for the nine circuits is more than 2000 s as shown in Fig. 11. Additionally, our scheme does not depend on the CPS, thus the CPU runtime for each circuit has met a greatly decrement with respect to the method in [16]. The experiments on the nine ITC99 and ISCAS benchmark circuits show that the CGIMT achieves a 3.97x speedup compared with the existing methods on average.

    Fig. 9. Number of CGs.

    Fig. 10. Area overhead evaluation.

    Fig. 11. CPU runtime.

    Fig. 12. Delay mitigation rate.

    After obtaining the CGs using the two methods, we replace them with the fresh device to guarantee the normal lifetime for each circuit. However, the degree of optimization for each circuit could not be the same by using these two methods. In order to compare the optimization degree, we define the delay mitigation rate (DMR) as the following formation shows,

    where K is the total number of the CPS in [16], ΔDi,nmitis the delay degradation of critical path Pi with no mitigation, ΔDi,mitis the delay degradation of critical path of Pi after the gate replacement. Even though our CGs number is smaller than that in [16], the mean delay mitigation rate difference for the circuits between these two methods, as Fig. 12 demonstrates, is less than 0.72%.

    6. Conclusions

    The CGs identification is the most important basis for circuit aging protection, while the TCLG should not be neglected in the process of CGs identification exactly as analysed above. In this paper, a time-efficient CGs identification method is proposed with considering TCLG in the circuit. As the accuracy of aging prediction for each circuit is acceptable, our method can achieve the experimental results with a 3.97x speedup and saving as much as 27.21% area overhead with the normal lifetime guaranteed, when compared with the existing methods.

    [1] B. Zhao, Y. Wang, H. Z. Yang, and H. Wang, “NBTI impact on RF front end in wireless sensor networks,” Journal of Electronic Science and Technology, vol. 7, no. 4, pp. 362-369, Dec. 2009.

    [2] D. K. Schroder and J. A. Babcock, “Negative bias temperature instability: Road to cross in deep submicron silicon semiconductor manufacturing,” IEEE Trans. on Applied Physics, vol. 94, pp. 1-18, Jun. 2003.

    [3] W. P. Wang, S. Q. Yang, S. Bhardwaj, et al., “The impact of NBTI on the performance of combinational and sequential circuits,” in Proc. of the 44th Design Automation Conf., Washington DC, 2007, pp. 364-369.

    [4] S. Bhardwaj, W. Wang, Y. Cao, et al., “Predictive modeling of the NBTI effect for reliable design,” in Proc. of 12th Custom Integrated Circuits Conf., San Jose, 2006, pp. 189-192.

    [5] R. Vattikonda, W. Wang, and Y. Cao, “Modeling and minimization of PMOS NBTI effect for robust nanometer design,” in Proc. of the 43th Design Automation Conf., San Francisco, 2006, pp. 1047-1052.

    [6] N. A. Conos, S. Meguerdichian, and M. Potkonjak, “Gate sizing in the presence of gate switching activity and input vector control,” in Proc. of the 21st Intl. Conf. on Very Large Scale Integration, Istanbul, 2013, pp. 138-143.

    [7] S. Jin, Y. Han, L. Zhang, et al., “M-IVC: Using multiple input vector to minimize aging-induced delay,” in Proc. of the 18th Asian Test Symposium, Taichung, 2009, pp. 437-442.

    [8] Y. Wang, Y. Cao, Y. Xie, et al., “Leakage power and circuit aging cooptimization by gate replacement techniques,”IEEE Trans. on Very Large Scale Integration Systems, vol. 19, pp. 615-628, Jan. 2011.

    [9] L. Zhang and R. Dick, “Scheduled voltage scaling for increasing lifetime in the presence of NBTI,” in Proc. of the Asia and South Pacific Design Automation Conf., Yokohama, 2009, pp. 492-497.

    [10] S. Kumar, C. Kim, and S. Sapatnekar, “Adaptive techniques for overcoming performance degradation due to aging in digital circuits,” in Proc. of the Asia and South Pacific Design Automation Conf., Yokohama, 2009, pp. 284-289.

    [11] P. Krause and I. Polian, “Adaptive voltage over-scaling for resilient applications,” in Proc. of the 44th Design Automation Conf., Grenoble, 2011, pp. 944-949.

    [12] Z. J. He, T. Lv, H. W. Li, et al., “An efficient algorithm for finding a universal set of testable long paths,” in Proc. of the 19th Asian Test Symposium, Shanghai, 2010, pp. 319-324.

    [13] Z. J. He, T. Lv, H. W. Li, et al., “Test path selection for capturing delay failures under statistical timing model,”IEEE Trans. on Very Large Scale Integration Systems, vol. 21, pp. 1210-1219, Jul. 2013.

    [14] J. J. Liou, A. Krstic, K. T. Cheng, et al., “False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation,” in Proc. of the 39th Design Automation Conf., San Francisco, 2002, pp. 566-569.

    [15] I. C. Lin, C. H. Lin, and K. H. Li, “Leakage and aging optimization using transmission gate-based technique,”IEEE Trans. on Computer-Aided Design of Circuits, vol. 32, pp. 87-99, Dec. 2013.

    [16] W. Wang, Z. Wang, and C. Yu, “An efficient method to identify critical gates under circuit aging,” in Proc. of the 18th Intl. Conf. on Computer-Aided Design, San Jose, 2007, pp. 735-740.

    [17] W. Wang, S. Yang, and Y. Cao, “Node criticality computation for circuit timing analysis and optimization under NBTI effect,” in Proc. of the 9th Intl. Symposium on Quality Electronic Design, San Jose, 2008, pp. 763-768.

    [18] D. Bild, G. Bok, and R. Dick, “Minimization of NBTI performance degradation using internal node control,” in Proc. of the 13th Design Automation Test in Europe, Munich, 2009, pp. 148-153.

    [19] J. Keane, T. H. Kim, and C. H. Kim, “An on-chip NBTI sensor for measuring pMOS threshold voltage degradation,”IEEE Trans. on Very Large Scale Integration Systems, vol. 18, pp. 947-956, Oct. 2010.

    [20] W. Zhao and Y. Cao, “New generation of predictive technology model for sub-45nm early design explorations,”in Proc. of the 7th Intl. Symposium on Quality Electronic Design, San Jose, 2006, pp. 2816-2823.

    [21] M. Agarwal, V. Balakrishnan, and A. Bhuyan, “Optimized circuit failure prediction for aging: Practicality and promise,” in Proc. of the 19th Intl. Test Conf., Santa Clara, 2008, pp. 1-10.

    [22] T. B. Chan, W. T. J. Chan, and A. B. Kahng, “Impact of adaptive voltage scaling on aging-aware signoff,” in Proc. of the 17th Design Automation Test in Europe, Munich, 2013, pp. 1683-1688.

    [23] T. B. Chan, W. J. Chan, and A. B. Kahng, “On aging-aware signoff for circuits with adaptive voltage scaling,” IEEE Trans. on Circuits and Systems, vol. 61, pp. 2920-2930, Oct. 2014.

    Tian-Song Yuwas born in Anhui, China in 1990. He received the B.S. degree in electronic science and technology from Hefei University of Technology (HFUT), Hefei in 2012. He currently is a postgraduate with HFUT. His research interests include circuit aging prediction and protection methods.

    Hua-Guo Liangwas born in Anhui, China in 1959. He received the Ph.D. degree from the University of Stuttgart, Germany. He currently is a professor and Ph.D. supervisor in computer science at HFUT. He is the member of the Fault Tolerant Computing Technical Committee of CFF. His main research interests include Built-In Self Test (BIST), design automation of digital system, ATPG algorithm, and distributed control system.

    Da-Wen Xuwas born in 1986. He received the B.S. degree in computer science from Xi’dian University, Xi’an in 2007, and the M.S. and Ph.D. degrees from the Institute of Computing Technology, Chinese Academy of Science, Beijing in 2009 and 2013, respectively. He is currently an associate professor with HFUT. His current research interests include heterogeneous computing, VLSI design and testing, and reliable system.

    Lu-Sheng Wangwas born in 1981. He received the B.S. and M.S. degrees in communication engineering from Beijing University of Posts and Telecommunications, Beijing in 2004 and 2006, respectively, and the Ph.D. degree in computer and network from the Ecole Nationale Superieure des Telecommunications de Paris, Paris in 2010. He is currently a professor with HFUT. His current research interests include heterogeneous wireless & 5G cellular network and large-scale terminal/big data wireless networks.

    Manuscript received November 18, 2014; revised December 30, 2014. This work was supported by the National Natural Science Foundation of China under Grant No. 61274036, No. 61371025, No. 61204027, and No. 61474036.

    T.-S. Yu is with the School of Electronic Sicence and Applied Physics, Hefei University of Technology, Hefei 230009, China (Corresponding author e-mail: yutian song19@163.com).

    H.-G. Liang, D.-W. Xu, and L.-S. Wang are with the School of Electronic Sicence and Applied Physics, Hefei University of Technology, Hefei 230009, China.

    Digital Object Identifier: 10.11989/JEST.1674-862X.411181

    国产爽快片一区二区三区| 国产精品久久久久久久久免| 在线看a的网站| 亚洲精品日本国产第一区| 大码成人一级视频| 日韩一本色道免费dvd| 亚洲国产精品一区三区| 精品人妻在线不人妻| 一本色道久久久久久精品综合| av在线老鸭窝| 97在线视频观看| 亚洲丝袜综合中文字幕| √禁漫天堂资源中文www| 免费在线观看完整版高清| 高清不卡的av网站| 精品酒店卫生间| 狂野欧美激情性bbbbbb| 9191精品国产免费久久| 日韩中文字幕视频在线看片| av在线观看视频网站免费| 宅男免费午夜| 久久99热6这里只有精品| 国产在视频线精品| av免费在线看不卡| 午夜日本视频在线| 国产免费福利视频在线观看| 精品国产一区二区三区四区第35| av女优亚洲男人天堂| 热99国产精品久久久久久7| 黑人欧美特级aaaaaa片| 9191精品国产免费久久| 国产成人a∨麻豆精品| xxxhd国产人妻xxx| xxxhd国产人妻xxx| 天堂8中文在线网| 精品国产一区二区久久| 亚洲精品久久久久久婷婷小说| 永久免费av网站大全| 欧美日韩一区二区视频在线观看视频在线| 最近中文字幕2019免费版| 国产又色又爽无遮挡免| 亚洲伊人色综图| 国产无遮挡羞羞视频在线观看| a 毛片基地| 最近手机中文字幕大全| 男女高潮啪啪啪动态图| 菩萨蛮人人尽说江南好唐韦庄| 免费在线观看黄色视频的| 一区二区三区精品91| 亚洲av国产av综合av卡| 国产免费一级a男人的天堂| 大陆偷拍与自拍| 亚洲人成网站在线观看播放| 男女午夜视频在线观看 | 水蜜桃什么品种好| 精品少妇内射三级| 国产男女内射视频| 美女主播在线视频| 日韩精品有码人妻一区| 美女主播在线视频| 永久免费av网站大全| 成年人免费黄色播放视频| 国产免费又黄又爽又色| 国产爽快片一区二区三区| 日本欧美视频一区| 国产精品一二三区在线看| 9热在线视频观看99| 咕卡用的链子| 侵犯人妻中文字幕一二三四区| 亚洲av综合色区一区| 午夜精品国产一区二区电影| 国产精品久久久av美女十八| 夜夜爽夜夜爽视频| h视频一区二区三区| 精品亚洲成a人片在线观看| 久久精品国产亚洲av天美| 亚洲精品第二区| 午夜福利视频精品| 亚洲精品国产色婷婷电影| 亚洲美女视频黄频| 中文字幕另类日韩欧美亚洲嫩草| 久久国产精品男人的天堂亚洲 | 国产精品.久久久| 伦理电影大哥的女人| 又黄又爽又刺激的免费视频.| 国产高清三级在线| 国产亚洲av片在线观看秒播厂| 婷婷色av中文字幕| freevideosex欧美| 亚洲性久久影院| 九草在线视频观看| 亚洲人成77777在线视频| 精品人妻熟女毛片av久久网站| 午夜免费观看性视频| 久久人人97超碰香蕉20202| 99久久人妻综合| 高清毛片免费看| 久久精品久久久久久久性| 亚洲精品成人av观看孕妇| 蜜桃国产av成人99| 一个人免费看片子| 亚洲人成网站在线观看播放| 亚洲久久久国产精品| 亚洲成人av在线免费| 亚洲精品aⅴ在线观看| 国产白丝娇喘喷水9色精品| 久久久久精品人妻al黑| 日韩欧美一区视频在线观看| 国产亚洲精品第一综合不卡 | 亚洲久久久国产精品| 久久精品国产亚洲av涩爱| 国产爽快片一区二区三区| 97人妻天天添夜夜摸| 成人无遮挡网站| 综合色丁香网| 精品少妇内射三级| 久久国产亚洲av麻豆专区| 中文字幕精品免费在线观看视频 | 久久久国产精品麻豆| 全区人妻精品视频| 香蕉丝袜av| 在线看a的网站| 日韩人妻精品一区2区三区| 欧美精品一区二区免费开放| 免费人妻精品一区二区三区视频| 交换朋友夫妻互换小说| www.av在线官网国产| 亚洲精品中文字幕在线视频| 激情五月婷婷亚洲| 国产永久视频网站| 成年人免费黄色播放视频| 欧美成人精品欧美一级黄| 中文字幕av电影在线播放| 如日韩欧美国产精品一区二区三区| 亚洲中文av在线| 久久久a久久爽久久v久久| 中文乱码字字幕精品一区二区三区| 黄片播放在线免费| 亚洲一区二区三区欧美精品| 国产无遮挡羞羞视频在线观看| 在线观看美女被高潮喷水网站| √禁漫天堂资源中文www| 又粗又硬又长又爽又黄的视频| 十分钟在线观看高清视频www| 日韩中字成人| 亚洲精品,欧美精品| 亚洲一码二码三码区别大吗| 国产福利在线免费观看视频| 亚洲激情五月婷婷啪啪| 最近最新中文字幕大全免费视频 | 国产有黄有色有爽视频| 精品熟女少妇av免费看| 欧美亚洲 丝袜 人妻 在线| 两性夫妻黄色片 | 2018国产大陆天天弄谢| 久久影院123| 国产男人的电影天堂91| 国产欧美日韩综合在线一区二区| 亚洲精品,欧美精品| 国产极品天堂在线| 天天躁夜夜躁狠狠久久av| 成人毛片a级毛片在线播放| 大陆偷拍与自拍| 国产高清不卡午夜福利| 亚洲av电影在线进入| 久久国产精品大桥未久av| 国产永久视频网站| 91午夜精品亚洲一区二区三区| 制服诱惑二区| 国产成人91sexporn| 色哟哟·www| 校园人妻丝袜中文字幕| 性色avwww在线观看| 韩国av在线不卡| 99热这里只有是精品在线观看| 欧美亚洲日本最大视频资源| 欧美3d第一页| 久久午夜福利片| 一级a做视频免费观看| 女人久久www免费人成看片| 欧美成人午夜免费资源| 久久久久久人妻| 咕卡用的链子| 欧美精品国产亚洲| 欧美日韩视频精品一区| 久久久久久久久久人人人人人人| 国产精品久久久av美女十八| 热re99久久精品国产66热6| 国产 精品1| 97精品久久久久久久久久精品| 久久韩国三级中文字幕| 在线观看美女被高潮喷水网站| 成人国语在线视频| 国产极品粉嫩免费观看在线| 91aial.com中文字幕在线观看| 五月开心婷婷网| 少妇的逼水好多| 国产成人精品一,二区| 国产不卡av网站在线观看| 精品国产露脸久久av麻豆| 久久人妻熟女aⅴ| 制服诱惑二区| 中文欧美无线码| 永久网站在线| 边亲边吃奶的免费视频| a级毛片在线看网站| 日韩人妻精品一区2区三区| 最新的欧美精品一区二区| 最新的欧美精品一区二区| 永久网站在线| 国产女主播在线喷水免费视频网站| 最近中文字幕2019免费版| 亚洲精品乱码久久久久久按摩| 国产精品成人在线| 亚洲av男天堂| 久久综合国产亚洲精品| 国产精品熟女久久久久浪| 麻豆精品久久久久久蜜桃| 91成人精品电影| 熟女av电影| 天堂中文最新版在线下载| 搡女人真爽免费视频火全软件| 黑人高潮一二区| 日韩成人av中文字幕在线观看| 咕卡用的链子| 一二三四在线观看免费中文在 | 亚洲av在线观看美女高潮| 国产成人一区二区在线| 国产福利在线免费观看视频| 亚洲av成人精品一二三区| 在线观看美女被高潮喷水网站| 熟女人妻精品中文字幕| 亚洲av在线观看美女高潮| 国产毛片在线视频| 欧美xxⅹ黑人| 成人手机av| 亚洲一卡2卡3卡4卡5卡精品中文| 国产成人一区二区三区免费视频网站| 色婷婷av一区二区三区视频| 中出人妻视频一区二区| 成熟少妇高潮喷水视频| 国产97色在线日韩免费| 午夜久久久在线观看| 国产日韩一区二区三区精品不卡| 怎么达到女性高潮| 曰老女人黄片| www.自偷自拍.com| 一a级毛片在线观看| 90打野战视频偷拍视频| 如日韩欧美国产精品一区二区三区| 欧美成人免费av一区二区三区 | 精品福利观看| 99re在线观看精品视频| 丝袜美腿诱惑在线| 成年人黄色毛片网站| 久久久国产一区二区| 成人18禁高潮啪啪吃奶动态图| 男男h啪啪无遮挡| 亚洲成人免费电影在线观看| av在线播放免费不卡| 亚洲aⅴ乱码一区二区在线播放 | 国产男靠女视频免费网站| 美女高潮喷水抽搐中文字幕| 久久久久久久久久久久大奶| 自拍欧美九色日韩亚洲蝌蚪91| 欧美乱码精品一区二区三区| 日本黄色视频三级网站网址 | 狂野欧美激情性xxxx| 欧美日韩精品网址| 在线观看免费视频网站a站| 黄频高清免费视频| 可以免费在线观看a视频的电影网站| 欧美精品啪啪一区二区三区| av在线播放免费不卡| 国产免费现黄频在线看| 大码成人一级视频| 日韩免费高清中文字幕av| 纯流量卡能插随身wifi吗| 亚洲熟妇中文字幕五十中出 | 亚洲人成电影观看| 国产精品美女特级片免费视频播放器 | 日韩三级视频一区二区三区| 亚洲性夜色夜夜综合| 亚洲avbb在线观看| 在线观看66精品国产| 丰满饥渴人妻一区二区三| 99国产精品免费福利视频| 欧美成狂野欧美在线观看| 成人精品一区二区免费| 精品久久久久久,| 久久久国产精品麻豆| 最新美女视频免费是黄的| 国产又爽黄色视频| 成人国语在线视频| 男女午夜视频在线观看| 很黄的视频免费| 不卡一级毛片| 欧美精品一区二区免费开放| 日韩中文字幕欧美一区二区| 国产成人精品久久二区二区91| 黄色a级毛片大全视频| 国产一区有黄有色的免费视频| 99热国产这里只有精品6| 丰满饥渴人妻一区二区三| 久久亚洲真实| 老熟妇乱子伦视频在线观看| 大型av网站在线播放| 亚洲中文日韩欧美视频| 女性生殖器流出的白浆| 成人18禁高潮啪啪吃奶动态图| 精品一品国产午夜福利视频| 大片电影免费在线观看免费| 国产一区在线观看成人免费| 欧美成人免费av一区二区三区 | 91国产中文字幕| 又黄又爽又免费观看的视频| 满18在线观看网站| 好看av亚洲va欧美ⅴa在| 黄色视频不卡| 夜夜躁狠狠躁天天躁| 国产免费av片在线观看野外av| 大码成人一级视频| 天天影视国产精品| 老司机午夜福利在线观看视频| 人人妻,人人澡人人爽秒播| 两性夫妻黄色片| 黑人巨大精品欧美一区二区mp4| 亚洲七黄色美女视频| 好看av亚洲va欧美ⅴa在| videosex国产| 中文字幕高清在线视频| 成人免费观看视频高清| 亚洲精品久久午夜乱码| 深夜精品福利| 黄片播放在线免费| 99国产精品免费福利视频| 国产日韩一区二区三区精品不卡| 黄片小视频在线播放| 丰满人妻熟妇乱又伦精品不卡| 午夜福利欧美成人| 国产男女内射视频| 久热这里只有精品99| 一级片'在线观看视频| 国产男靠女视频免费网站| 亚洲熟女精品中文字幕| 色老头精品视频在线观看| 99热只有精品国产| 国产单亲对白刺激| 超碰97精品在线观看| 久久中文字幕一级| 两个人看的免费小视频| av中文乱码字幕在线| 中亚洲国语对白在线视频| 国精品久久久久久国模美| 天天影视国产精品| 在线观看免费午夜福利视频| 水蜜桃什么品种好| 91成年电影在线观看| 国产精品久久电影中文字幕 | 国产亚洲欧美在线一区二区| 老司机午夜福利在线观看视频| 亚洲三区欧美一区| 亚洲av日韩在线播放| 精品久久久久久久久久免费视频 | 日韩中文字幕欧美一区二区| 中文字幕另类日韩欧美亚洲嫩草| 高潮久久久久久久久久久不卡| 久久国产乱子伦精品免费另类| 十八禁人妻一区二区| 亚洲av片天天在线观看| 精品乱码久久久久久99久播| 91麻豆av在线| 亚洲av成人不卡在线观看播放网| 国产区一区二久久| 搡老岳熟女国产| 777米奇影视久久| 精品一区二区三卡| 国产精品免费大片| 久热这里只有精品99| 国产精品免费大片| 国产91精品成人一区二区三区| 91大片在线观看| 99热只有精品国产| 日日爽夜夜爽网站| 91成年电影在线观看| 王馨瑶露胸无遮挡在线观看| 国产有黄有色有爽视频| 亚洲一区中文字幕在线| 午夜福利在线观看吧| 侵犯人妻中文字幕一二三四区| 午夜福利在线观看吧| 黑人巨大精品欧美一区二区mp4| 最新的欧美精品一区二区| 亚洲三区欧美一区| 中文字幕人妻熟女乱码| 黑人巨大精品欧美一区二区蜜桃| 国产97色在线日韩免费| 精品视频人人做人人爽| 高清在线国产一区| www.999成人在线观看| 99精品在免费线老司机午夜| 久久国产精品大桥未久av| av电影中文网址| 性色av乱码一区二区三区2| 热99国产精品久久久久久7| 最近最新中文字幕大全免费视频| 亚洲专区国产一区二区| 大香蕉久久成人网| 亚洲专区中文字幕在线| 首页视频小说图片口味搜索| 欧美黑人精品巨大| 制服人妻中文乱码| 岛国毛片在线播放| 好看av亚洲va欧美ⅴa在| 日本a在线网址| 一边摸一边抽搐一进一出视频| 啪啪无遮挡十八禁网站| 亚洲精品在线美女| 欧美日韩福利视频一区二区| 男女午夜视频在线观看| 美女扒开内裤让男人捅视频| 日韩欧美三级三区| 国产成人免费无遮挡视频| 久久国产精品大桥未久av| 无限看片的www在线观看| 亚洲七黄色美女视频| 水蜜桃什么品种好| 亚洲色图 男人天堂 中文字幕| 久久久久久久国产电影| 最新在线观看一区二区三区| 亚洲片人在线观看| 91老司机精品| 国产成人精品在线电影| 亚洲va日本ⅴa欧美va伊人久久| 精品福利永久在线观看| 黄网站色视频无遮挡免费观看| 成人黄色视频免费在线看| 嫩草影视91久久| 久久久国产成人精品二区 | a级毛片在线看网站| 国产精品亚洲一级av第二区| 免费观看a级毛片全部| 丝瓜视频免费看黄片| 狂野欧美激情性xxxx| 日韩欧美一区视频在线观看| 精品国产乱子伦一区二区三区| 97人妻天天添夜夜摸| 国产亚洲欧美在线一区二区| 欧美 亚洲 国产 日韩一| 久久99一区二区三区| 久热爱精品视频在线9| 成人黄色视频免费在线看| 99久久人妻综合| 91麻豆av在线| 亚洲av美国av| 黑人操中国人逼视频| 国产成人精品无人区| 黄色成人免费大全| 69精品国产乱码久久久| 国产亚洲精品第一综合不卡| 成人18禁在线播放| 久久久久精品人妻al黑| 美国免费a级毛片| 母亲3免费完整高清在线观看| 在线观看www视频免费| 如日韩欧美国产精品一区二区三区| 日韩制服丝袜自拍偷拍| 最近最新中文字幕大全免费视频| 国产免费男女视频| 久久中文字幕一级| 91九色精品人成在线观看| 久久精品人人爽人人爽视色| 精品一区二区三区av网在线观看| 另类亚洲欧美激情| 午夜久久久在线观看| 亚洲,欧美精品.| 91精品国产国语对白视频| 欧美激情高清一区二区三区| 国产精品亚洲一级av第二区| 久久午夜亚洲精品久久| 亚洲美女黄片视频| 久久久久精品国产欧美久久久| 黄色视频不卡| 女性被躁到高潮视频| 成人手机av| av天堂在线播放| 国产精品免费大片| 日韩三级视频一区二区三区| 老司机亚洲免费影院| 青草久久国产| 精品人妻1区二区| 亚洲avbb在线观看| 成年人免费黄色播放视频| 久久精品亚洲精品国产色婷小说| 高清毛片免费观看视频网站 | 精品一品国产午夜福利视频| 亚洲欧美日韩高清在线视频| 黄频高清免费视频| 在线观看www视频免费| 免费不卡黄色视频| 一进一出好大好爽视频| 午夜日韩欧美国产| 男女下面插进去视频免费观看| 成人特级黄色片久久久久久久| 免费在线观看亚洲国产| 日韩欧美一区二区三区在线观看 | 国产精品二区激情视频| 女人爽到高潮嗷嗷叫在线视频| 麻豆av在线久日| 嫩草影视91久久| 国产成人啪精品午夜网站| 黄色视频不卡| 手机成人av网站| 麻豆国产av国片精品| 欧美av亚洲av综合av国产av| 人人澡人人妻人| 中文字幕另类日韩欧美亚洲嫩草| 精品国产亚洲在线| 亚洲成国产人片在线观看| 亚洲,欧美精品.| 女人爽到高潮嗷嗷叫在线视频| 丝袜人妻中文字幕| 99国产极品粉嫩在线观看| 丰满人妻熟妇乱又伦精品不卡| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲精品粉嫩美女一区| 看黄色毛片网站| 日本a在线网址| 国产精品久久久久久精品古装| 成人国语在线视频| 国产精品二区激情视频| 亚洲一区二区三区不卡视频| 国产色视频综合| 欧美av亚洲av综合av国产av| 黄色怎么调成土黄色| 亚洲七黄色美女视频| 亚洲国产欧美日韩在线播放| 一级片'在线观看视频| 国产欧美亚洲国产| 国产乱人伦免费视频| 操出白浆在线播放| 80岁老熟妇乱子伦牲交| 丝袜美足系列| 午夜福利在线观看吧| 亚洲伊人色综图| 国产精品一区二区在线不卡| 香蕉丝袜av| 不卡一级毛片| 成熟少妇高潮喷水视频| 国产一区二区激情短视频| 国产精品一区二区精品视频观看| 久久久精品国产亚洲av高清涩受| 久久精品国产亚洲av香蕉五月 | cao死你这个sao货| 亚洲专区中文字幕在线| 成人18禁在线播放| 99国产综合亚洲精品| 动漫黄色视频在线观看| 欧美一级毛片孕妇| 老汉色av国产亚洲站长工具| 一边摸一边抽搐一进一出视频| 18禁黄网站禁片午夜丰满| 久久亚洲精品不卡| 热re99久久国产66热| 最新的欧美精品一区二区| 久久久国产欧美日韩av| 一级毛片女人18水好多| 啪啪无遮挡十八禁网站| 国产在线一区二区三区精| 久久影院123| 精品免费久久久久久久清纯 | 精品午夜福利视频在线观看一区| 岛国毛片在线播放| 一级黄色大片毛片| 首页视频小说图片口味搜索| 天堂√8在线中文| 老司机在亚洲福利影院| 日韩一卡2卡3卡4卡2021年| 亚洲av美国av| 美女国产高潮福利片在线看| 精品无人区乱码1区二区| 亚洲成人国产一区在线观看| 国产精品乱码一区二三区的特点 | 成人手机av| 精品国产一区二区三区四区第35| 精品高清国产在线一区| 大香蕉久久成人网| 精品一区二区三卡| 丝袜美足系列| 欧美精品一区二区免费开放| 国产精品香港三级国产av潘金莲| 亚洲国产欧美网| 在线观看免费日韩欧美大片| 丁香欧美五月| 少妇猛男粗大的猛烈进出视频| a在线观看视频网站| 免费少妇av软件| 91精品国产国语对白视频| a在线观看视频网站| 国产xxxxx性猛交| 色综合婷婷激情| 91国产中文字幕| 一区福利在线观看| 女人爽到高潮嗷嗷叫在线视频| 麻豆国产av国片精品| 国产蜜桃级精品一区二区三区 | 亚洲人成电影观看| 99re在线观看精品视频| 王馨瑶露胸无遮挡在线观看| 制服诱惑二区| 80岁老熟妇乱子伦牲交| 又黄又粗又硬又大视频| 在线观看日韩欧美| 他把我摸到了高潮在线观看| 免费日韩欧美在线观看|