
Saman Adham
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c14]Shih-Lien Lu, Cheng-En Lee, Peter Noel, Saman Adham, Ted Wong, Jonathan Chang:
A Reliable, Low-Cost, Low-Energy Physically Unclonable Function Circuit Through Effective Filtering. VLSI-DAT 2019: 1-4 - 2014
- [j4]Mu-Shan Lin, Chien-Chun Tsai, Chih-Hsien Chang, Wen-Hung Huang, Ying-Yu Hsu, Shu-Chun Yang, Chin-Ming Fu, Mao-Hsuan Chou, Tien-Chien Huang, Ching-Fang Chen, Tze-Chiang Huang, Saman Adham, Min-Jer Wang, William Wu Shen, Ashok Mehta:
A 1 Tbit/s Bandwidth 1024 b PLL/DLL-Less eDRAM PHY Using 0.3 V 0.105 mW/Gbps Low-Swing IO for CoWoS Application. IEEE J. Solid State Circuits 49(4): 1063-1074 (2014) - [c13]Saman Adham, Jonathan Chang, Hung-Jen Liao, John Hung, Ting-Hua Hsieh:
The importance of DFX, a foundry perspective. ITC 2014: 1-6 - [c12]Sandeep Kumar Goel, Min-Jer Wang, Saman Adham, Ashok Mehta, Frank Lee:
Design-for-diagnosis: Your safety net in catching design errors in known good dies in CoWoSTM/3D ICs. VLSI-DAT 2014: 1-4 - [c11]Mincent Lee, Saman Adham, Min-Jer Wang, Ching-Nen Peng, Hung-Chih Lin, Sen-Kuei Hsu, Hao Chen:
A novel DFT architecture for 3DIC test, diagnosis and repair. VLSI-DAT 2014: 1-4 - 2013
- [c10]Sandeep Kumar Goel, Saman Adham, Min-Jer Wang, Ji-Jan Chen, Tze-Chiang Huang, Ashok Mehta, Frank Lee, Vivek Chickermane, Brion L. Keller, Thomas Valind, Subhasish Mukherjee, Navdeep Sood, Jeongho Cho, Hayden Hyungdong Lee, Jungi Choi, Sangdoo Kim:
Test and debug strategy for TSMC CoWoS™ stacking process based heterogeneous 3D IC: A silicon case study. ITC 2013: 1-10
2000 – 2009
- 2009
- [j3]Benoit Nadeau-Dostie, Saman Adham, Russell Abbott:
Improved Core Isolation and Access for Hierarchical Embedded Test. IEEE Des. Test Comput. 26(1): 18-25 (2009) - 2004
- [c9]Saman Adham, Benoit Nadeau-Dostie:
A BIST Algorithm for Bit/Group Write Enable Faults in SRAMs. MTDT 2004: 98-101 - 2000
- [c8]Saman Adham, Dhamin Al-Khalili, Come Rozon, D. Raez:
Comprehensive defect analysis and testability of current-mode logic circuits. ISCAS 2000: 339-342
1990 – 1999
- 1999
- [j2]Saman M. I. Adham, Ken Brough, Bruce Ecroyd, Stephen Foster, Paul Soong:
Linking diagnostic software to hardware self test in telecom systems. IEEE Commun. Mag. 37(6): 79-83 (1999) - [j1]Yuejian Wu, Saman Adham:
Scan-based BIST fault diagnosis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 18(2): 203-211 (1999) - [c7]Bernard Antaki, Yvon Savaria, Nanhan Xiong, Saman Adham:
Design For Testability Method for CML Digital Circuits. DATE 1999: 360-367 - 1998
- [c6]Dhamin Al-Khalili, Saman Adham, Come Rozon, Moazzem Hossain, D. Racz:
Comprehensive Defect Analysis and Defect Coverage of CMOS Circuits. DFT 1998: 84-92 - [c5]José M. Miranda, Scott Davidson, Peter Dziel, Saman Adham, Steve Millman:
Test Reuse at System Level. VTS 1998: 318-319 - 1996
- [c4]Saman Adham, Sanjay Gupta:
DP-BIST: A Built-In Self Test For DSP DataPaths A Low Overhead and High Fault Coverage Technique. Asian Test Symposium 1996: 205-212 - [c3]Yuejian Wu, Saman Adham:
BIST Fault Diagnosis in Scan-Based VLSI Environments. ITC 1996: 48-57 - 1995
- [c2]Harry Hulvershorn, Paul Soong, Saman Adham:
Linking Diagnostic Software to Hardware Self Test in Telecom Systems. ITC 1995: 986-993 - [c1]Benoit Nadeau-Dostie, Harry Hulvershorn, Saman Adham:
A New Hardware Fault Insertion Scheme for System Diagnostics Verification. ITC 1995: 994-1002
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-09-25 21:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint