Conference Information
DFT 2015: International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems
Submission Date:
Notification Date:
Conference Date:
Amherst, Massachusetts, USA
QUALIS: b1   Viewed: 4395   Tracked: 0   Attend: 0

Conference Location
Call For Papers
DFT is an annual Symposium providing an open forum for presentations in the field of defect and fault tolerance in VLSI and nanotechnology systems inclusive of emerging technologies. One of the unique features of this symposium is to combine new academic research with state-of-the-art industrial data, necessary ingredients for significant advances in this field. All aspects of design, manufacturing, test, reliability, and availability that are affected by defects during manufacturing and by faults during system operation are of interest.


The Program Committee cordially invites you to participate and submit your contribution to DFT 2015. The conference topics include (but are not limited to) the following:

    Yield Analysis and Modeling
    Defect/Fault analysis and models; statistical yield modeling; critical area and metrics.
    Testing Techniques
    Built-in self-test; delay fault modeling and diagnosis; testing for analog and mixed circuits; signal and clock integrity.
    Design For Testability in IC Design
    FPGA, SoC, NoC, ASIC, microprocessors.
    Error Detection, Correction, and Recove- ry
    Self-testing and self-checking solutions; error-control coding; fault masking and avoidance; recovery schemes, space/time redundancy; hw/sw techniques.
    Dependability Analysis and Validation
    Fault injection techniques and environments; dependability characterization.
    Repair, Restructuring and Reconfiguration
    Repairable logic; reconfigurable circuit design; DFT for on-line operation; self-healing.
    Defect and Fault Tolerance
    Reliable circuit/system synthesis; radiation hardened/tolerant processes & design; design space exploration for dependable systems, transient/soft faults and errors.
    Totally Fail-Safe Design for Critical Applications
    Methodologies and case study applications to automotive, railway, avionics, industrial control, biomedicine, space and smart power networks.
    Emerging Technologies
    DFT techniques for CNTs, QCA, DNA, RTDs, SETs, molecular devices and self-assembly.
    Hardware security
    Fault attacks, fault tolerance-based counter- measures, Scan-based attacks and countermeasures, hardware trojans, security vs reliability trade-offs, interaction between VLSI test, trust, and reliability.

Paper submission

Prospective authors are invited to submit original and unpublished contri- butions. Two types of submissions are possible: (i) regular papers (6 pages - with the opportunity to purchase 2 additional ones), and (ii) short papers (4 pages) to be presented as posters. Both types will be included in the symposium proceedings and should adhere to the IEEE conference template, 2-columns style (available later), and submitted as PDF file, electronically.

We are also interested in panel sessions that involve industrial experiences: please send an email to the Program co-Chairs with a brief description (1 page max) of the proposed panel.


Each submission will be reviewed by the Program Co-Chairs to ensure compliance with the format criteria. The Program Co-Chairs will reject submissions that are not in compliance or that are out of scope of the conference.

All submissions that meet the criteria and fit the scope of the conference will be reviewed by at least three members of the Technical Program Committee. Submissions will be evaluated on the basis of originality, soundness, importance of contribution, quality of presentation, and appropriate comparison to related work.

The Program Co-Chairs will make the final decisions about which submissions are accepted for presentation at the conference.

Paper Publication and Presenter Registration

Papers will be accepted for regular or poster presentation at the symposium. Proceedings will be published and included in the IEEE Digital Library. It is mandatory that authors of accepted presentations attend to present their work at the conference and also that each accepted paper is accompanied by at least one full conference registration fee payment (no student registration) before the authors' registration deadline for the manuscript to be included and published in the proceedings.

Best Paper Award

All papers with a student as both primary author and presenter will be taken into consideration for the 2015 Best Paper Award.
Last updated by Dou Sun in 2015-04-05
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
IC3KInternational Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management2020-05-192020-07-172020-11-02
BalkanComInternational Balkan Conference on Communications and Networking2020-03-152020-05-072020-06-03
ISRLInternational Symposium on Reinforcement Learning2020-09-012020-09-152020-11-06
AITestIEEE International Conference On Artificial Intelligence Testing2019-11-252020-01-102020-04-13
JCC'IEEE International Conference on JointCloud Computing2019-12-072020-02-152020-04-13
ICCSPInternational Conference on Cryptography, Security and Privacy2019-11-052019-11-252020-01-10
b5FTFCIEEE Faible Tension Faible Consommation2014-02-142014-04-042014-05-04
ab1ICARCVInternational Conference on Control, Automation, Robotics and Vision2020-06-012020-08-312020-12-13
DySPANIEEE International Symposium on Dynamic Spectrum Access Networks2019-07-082019-08-082019-11-11
ICIC''International Conference on Intelligent Computing2018-09-222018-09-302018-10-25