Kassab
Maroun Kassab, St.-Eustache CA
Patent application number | Description | Published |
---|---|---|
20090106614 | SYSTEM AND METHOD FOR SIGNATURE-BASED SYSTEMATIC CONDITION DETECTION AND ANALYSIS - Disclosed are embodiments of a system, method and service for detecting and analyzing systematic conditions occurring in manufactured devices. Each embodiment comprises generating a unique signature for each of multiple tested devices. The signatures are generated based on an initial set of signature definitions and the values for those signature definitions that are derived at least in part from selected testing data. A systematic condition is detected based on commonalities between the signatures. The systematic condition is then analyzed, alone or in conjunction with additional information, in order to develop a list of underlying similarities between the devices. The analysis results can be used to refine the systematic condition detection and analysis processes by revising the signature definitions set and/or by modifying data selection. | 04-23-2009 |
20090132976 | METHOD FOR TESTING AN INTEGRATED CIRCUIT AND ANALYZING TEST DATA - A method for testing an integrated circuit and analyzing test data. The method includes: defining a set of signal path selection criteria; selecting a subset of signal paths of an integrated circuit design, the selecting signal paths meeting the selection criteria; identifying pattern observation points for each signal path of the subset of signal paths; selecting a set of features associated with the integrated circuit design; applying a set of test patterns to one or more integrated circuit chips; determining failing signal paths of the subset of signal paths for each integrated circuit chip; mapping failing signal paths of the subset of signal paths to the set of features to generate a correspondence between the failing signal paths and the features; and analyzing the correspondence and identifying suspect features of the set of features based on the analyzing. | 05-21-2009 |
20090240458 | METHOD FOR TESTING INTEGRATED CIRCUITS - A method of testing an integrated circuit. The method includes selecting a set of physical features of nets and devices of the integrated circuit, the integrated circuit having pattern input points and pattern observation points connected by the nets, each of the nets defined by an input point and all fan out paths to (i) input points of other nets of the nets or (ii) to the pattern observation points; selecting a measurement unit for each feature of the set of features; assigning a weight to each segment of each fan out path based on a number of the measurement units of the feature in each segment of each fan out path of each of the nets; and generating a set of test patterns optimized for test-coverage and cost based on the weights assigned to each segment of each of the nets of the integrated circuit. | 09-24-2009 |
Maroun Kassab, Quebec CA
Patent application number | Description | Published |
---|---|---|
20110214102 | METHOD FOR TESTING INTEGRATED CIRCUITS - A method of testing an integrated circuit. The method includes selecting a set of physical features of nets and devices of the integrated circuit, the integrated circuit having pattern input points and pattern observation points connected by the nets, each of the nets defined by an input point and all fan out paths to (i) input points of other nets of the nets or (ii) to the pattern observation points; selecting a measurement unit for each feature of the set of features; assigning a weight to each segment of each fan out path based on a number of the measurement units of the feature in each segment of each fan out path of each of the nets; and generating a set of test patterns optimized for test-coverage and cost based on the weights assigned to each segment of each of the nets of the integrated circuit. | 09-01-2011 |
Maroun M. Kassab, St. Eustache CA
Patent application number | Description | Published |
---|---|---|
20140149408 | DATA MINING SHAPE BASED DATA - Embodiments of the disclosure include a method for data mining shape based data, the method includes receiving shape data for each of a plurality of data entries and creating a first abstract from the shape data for each of the plurality of data entries. The method also includes organizing the first abstracts into a plurality of groups based on a criterion and creating a second abstract for each data entry in the plurality of groups based on the criterion and information derived from the first abstract. | 05-29-2014 |
20140149458 | DATA MINING SHAPE BASED DATA - Embodiments of the disclosure include a method for data mining shape based data, the method includes receiving shape data for each of a plurality of data entries and creating a first abstract from the shape data for each of the plurality of data entries. The method also includes organizing the first abstracts into a plurality of groups based on a criterion and creating a second abstract for each data entry in the plurality of groups based on the criterion and information derived from the first abstract. | 05-29-2014 |
Mohamed Kassab, Cesson Sevigne FR
Patent application number | Description | Published |
---|---|---|
20100189258 | METHOD FOR DISTRIBUTING AN AUTHENTICATION KEY, CORRESPONDING TERMINAL, MOBILITY SERVER AND COMPUTER PROGRAMS - A method and apparatus are provided for early distribution of at least one encryption key intended for securing a communication to be set up on the link layer of a cellular network formed of a plurality of cells, each controlled by an attachment point, between a mobile terminal and a set of attachment points, termed the target attachment points. The includes, for at least one target attachment point: creation of an encryption ticket containing an encryption key, enciphered on the basis of at least one authentication key specific to this target attachment point; receipt of the enciphered encryption ticket, by way of a current attachment point to which the mobile terminal is connected; identification, of a means of deciphering the enciphered encryption ticket, with the aid of the at least one authentication key, making it possible to obtain the encryption key. | 07-29-2010 |