Reverse Engineering of data simulation

被引:0
|
作者
机构
[1] Huang, Hung Liang
来源
Huang, H.L. (hhliang@iris.seed.net.tw) | 1600年 / PMJ-Photomask (Japan); BACUS-Internat. Techn. Group of SPIE; SPIE卷 / SPIE期
关键词
Theoretical; (THR);
D O I
暂无
中图分类号
学科分类号
摘要
Conventional simulation tools that verify the layout of a subwavelength IC against the silicon it is intended to produce. It reads in the layout and simulates lithographic process effects, including optical, resist and etch effects, then compares the results - the simulated silicon image - with the original (intended) layout, reporting out-of-tolerance regions. We here introduce a reverse engineering method that use ready database to simulate unknown pattern. By using this method, you can get more fast and accurate results then conventional simulation tools. We will discuss the advantage and disadvantage of this method and its application.
引用
收藏
相关论文
共 50 条
  • [21] Schemas for web data: a reverse engineering approach
    Bhowmick, SS
    Ng, WK
    Madria, S
    DATA & KNOWLEDGE ENGINEERING, 2001, 39 (02) : 105 - 142
  • [22] Reverse-Engineering EFSMs with Data Dependencies
    Foster, Michael
    Derrick, John
    Walkinshaw, Neil
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2021, 2022, 13045 : 37 - 54
  • [23] Analysis of data selection and optimization in reverse engineering
    Zhong, Zhi-Hua
    Huang, Hai-Sha
    Yang, Xu-Jing
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2004, 31 (04): : 18 - 23
  • [24] Data dependency elicitation in database reverse engineering
    Henrard, J
    Hainaut, JL
    FIFTH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 2001, : 11 - 19
  • [25] Visual reverse engineering of binary and data files
    Conti, Gregory
    Dean, Erik
    Sinda, Matthew
    Sangster, Benjamin
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 1 - 17
  • [26] Segmentation of the Measured Point Data in Reverse Engineering
    H.-C. Kim
    S.-M. Hur
    S.-H. Lee
    The International Journal of Advanced Manufacturing Technology, 2002, 20 : 571 - 580
  • [27] Reverse-engineering ecological then from data
    Martin, Benjamin T.
    Munch, Stephan B.
    Hein, Andrew M.
    PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2018, 285 (1878)
  • [28] Segmentation of the measured point data in reverse engineering
    Kim, HC
    Hur, SM
    Lee, SH
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2002, 20 (08): : 571 - 580
  • [29] An approach for processing irregular data into the regular data in reverse engineering
    Zhong, YM
    Mueller-Wittig, W
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF DESIGN AND MANUFACTURING, VOL 1, 2002, : 167 - 172
  • [30] Big Data Transformation Testing based on Data Reverse Engineering
    Tesfagiorgish, Dawit G.
    Li Junyi
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 649 - 652