|
|
|
|
LEADER |
03872nam a22005295i 4500 |
001 |
978-1-4020-8024-1 |
003 |
DE-He213 |
005 |
20151204170425.0 |
007 |
cr nn 008mamaa |
008 |
100301s2004 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781402080241
|9 978-1-4020-8024-1
|
024 |
7 |
|
|a 10.1007/b117092
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
100 |
1 |
|
|a Iman, Sasan.
|e author.
|
245 |
1 |
4 |
|a The e Hardware Verification Language
|h [electronic resource] /
|c by Sasan Iman, Sunita Joshi.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2004.
|
300 |
|
|
|a XXII, 349 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Verification Methodologies and Environment Architecture -- Verification Methodologies -- Anatomy of a Verification Environment -- All About e -- e as a Programming Language -- e as a Verification Language -- Topology and Stimulus Generation -- Generator Operation -- Data Modeling and Stimulus Generation -- Sequence Generation -- Response Collection, Data Checking, and Property Monitoring -- Temporal Expressions -- Messages -- Collectors and Monitors -- Scoreboarding -- Coverage Modeling and Measurement -- Coverage Engine -- Coverage Modeling -- e Code Reuse -- e Reuse Methodology -- si_util Package.
|
520 |
|
|
|a I am glad to see this new book on the e language and on verification. I am especially glad to see a description of the e Reuse Methodology (eRM). The main goal of verification is, after all, finding more bugs quicker using given resources, and verification reuse (module-to-system, old-system-to-new-system etc. ) is a key enabling component. This book offers a fresh approach in teaching the e hardware verification language within the context of coverage driven verification methodology. I hope it will help the reader und- stand the many important and interesting topics surrounding hardware verification. Yoav Hollander Founder and CTO, Verisity Inc. Preface This book provides a detailed coverage of the e hardware verification language (HVL), state of the art verification methodologies, and the use of e HVL as a facilitating verification tool in implementing a state of the art verification environment. It includes comprehensive descriptions of the new concepts introduced by the e language, e language syntax, and its as- ciated semantics. This book also describes the architectural views and requirements of verifi- tion environments (randomly generated environments, coverage driven verification environments, etc. ), verification blocks in the architectural views (i. e. generators, initiators, c- lectors, checkers, monitors, coverage definitions, etc. ) and their implementations using the e HVL. Moreover, the e Reuse Methodology (eRM), the motivation for defining such a gui- line, and step-by-step instructions for building an eRM compliant e Verification Component (eVC) are also discussed.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer-aided engineering.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Circuits and Systems.
|
650 |
2 |
4 |
|a Electrical Engineering.
|
650 |
2 |
4 |
|a Computer-Aided Engineering (CAD, CAE) and Design.
|
700 |
1 |
|
|a Joshi, Sunita.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781402080234
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b117092
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|