Exploration methodology for 3D memory redundancy architectures under redundancy constraints

Bing Yang Lin, Mincent Lee, Cheng Wen Wu

Research output: Contribution to journalConference articlepeer-review

7 Citations (Scopus)

Abstract

Redundancy repair is a commonly-used technique for memory yield improvement. In order to ensure high repair efficiency and final product yield, it is necessary to explore and develop the memory redundancy architecture carefully. However, due to the different failure distributions of memory arrays and various design constraints of memory architectures, it is difficult to explore the efficiency of the memory architecture thoroughly. In this paper, we propose a redundancy architecture exploration methodology to find the redundancy architecture with highest repair rate under redundancy constraints. Given a set of design constraints, failure distributions, and memory architectures, our methodology can explore at least 3(log 2 M *log 2 N *log 2 S) redundancy architectures systematically, where M, N, and S are the address sizes of memory row and column in a die, and the number of slices in the memory cube, respectively. In our experiments, the repair rates of 10 different 3D redundancy architectures with 3 different redundancy analysis algorithms in a given failure pattern distribution are simulated. The experimental result shows that the difference of the repair rates between the most efficient and least efficient memory redundancy architectures is up to 49.42%.

Original languageEnglish
Article number6690605
Pages (from-to)1-6
Number of pages6
JournalProceedings of the Asian Test Symposium
DOIs
Publication statusPublished - 2013 Jan 1
Event2013 22nd Asian Test Symposium, ATS 2013 - Yilan, Taiwan
Duration: 2013 Nov 182013 Nov 21

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Exploration methodology for 3D memory redundancy architectures under redundancy constraints'. Together they form a unique fingerprint.

Cite this