Generator of predictive verification pattern using vision system based on higher-order local autocorrelation

被引:4
|
作者
Matsunawa, Tetsuaki [1 ]
Maeda, Shimon [1 ]
Ichikawa, Hirotaka [2 ]
Nojima, Shigeki [1 ]
Tanaka, Satoshi [1 ]
Mimotogi, Shoji [1 ]
Nosato, Hirokazu [3 ]
Sakanashi, Hidenori [3 ]
Murakawa, Masahiro [3 ]
Takahashi, Eiichi [3 ]
机构
[1] Toshiba Co Ltd, Corp Res & Dev Ctr, Isogo Ku, 8 Shinsugita Cho, Yokohama, Kanagawa 2358522, Japan
[2] Toshiba Microelect Corp, CAD Dev & Support Dept, Kanagawa 2108538, Japan
[3] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki 3058568, Japan
来源
OPTICAL MICROLITHOGRAPHY XXV, PTS 1AND 2 | 2012年 / 8326卷
关键词
predictive verification data; pattern variation; pattern recognition; HLAC;
D O I
10.1117/12.916306
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Although lithography conditions, such as NA, illumination condition, resolution enhancement technique (RET), and material stack on wafer, have been determined to obtain hotspot-free wafer images, hotspots are still often found on wafers. This is because the lithography conditions are optimized with a limited variety of patterns. For 40 nm technology node and beyond, it becomes a critical issue causing not only the delay of process development but also the opportunity loss of the business. One of the easiest ways to avoid unpredictable hotspots is to verify an enormous variety of patterns in advance. This, however, is time consuming and cost inefficient. This paper proposes a new method to create a group of patterns to cover pattern variations in a chip layout based on Higher-Order Local Autocorrelation (HLAC), which consists of two phases. The first one is the "analyzing phase" and the second is the "generating phase". In the analyzing phase, geometrical features are extracted from actual layouts using the HLAC technique. Those extracted features are statistically analyzed and define the "feature space". In the generating phase, a group of patterns representing actual layout features are generated by correlating the feature space and the process margin. By verifying the proposed generated patterns, the lithography conditions can be optimized efficiently and the number of hotspots dramatically reduced.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Steganographic system based on higher-order statistics
    Tzschoppe, R
    Bäuml, R
    Huber, JB
    Kaup, A
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 156 - 166
  • [22] Antenna pattern analysis using higher-order FDTD method
    Wu, WY
    Kuo, CW
    APMC 2001: ASIA-PACIFIC MICROWAVE CONFERENCE, VOLS 1-3, PROCEEDINGS, 2001, : 918 - 921
  • [23] FORMAL VERIFICATION OF STATE-MACHINES USING HIGHER-ORDER LOGIC
    LOEWENSTEIN, PN
    PROCEEDINGS - IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN : VLSI IN COMPUTERS & PROCESSORS, 1989, : 204 - 207
  • [24] Contract-Based Resource Verification for Higher-Order Functions with Memoization
    Madhavan, Ravichandhran
    Kulal, Sumith
    Kuncak, Viktor
    ACM SIGPLAN NOTICES, 2017, 52 (01) : 330 - 343
  • [25] Novel higher-order local autocorrelation-like feature extraction methodology for facial expression recognition
    Lajevardi, S. M.
    Hussain, Z. M.
    IET IMAGE PROCESSING, 2010, 4 (02) : 114 - 119
  • [26] IDENTIFICATION AND DIGITAL CONTROL OF HIGHER-ORDER PROCESSES USING PREDICTIVE STRATEGY
    Bobal, Vladimir
    Kubalcik, Marek
    Chalupa, Petr
    Dostal, Petr
    PROCEEDINGS 26TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2012, 2012, : 426 - +
  • [27] System identification using higher-order cumulants and polycepstra
    Korze, D.
    Zazula, D.
    Elektrotehniski Vestnik, 1994, 61 (05):
  • [28] FIR System Identification using Higher-Order Statistics
    Abederrahim, K.
    Mathlouthi, H.
    Msahli, F.
    2009 AMERICAN CONTROL CONFERENCE, VOLS 1-9, 2009, : 5598 - +
  • [29] Cerebus: A higher-order behavior-based system
    Horswill, I
    AI MAGAZINE, 2002, 23 (01) : 27 - 27
  • [30] VERIFICATION OF A MULTIPROCESSOR CACHE PROTOCOL USING SIMULATION RELATIONS AND HIGHER-ORDER LOGIC
    LOEWENSTEIN, P
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 531 : 302 - 311