The e Hardware Verification Language

I am glad to see this new book on the e language and on verification. I am especially glad to see a description of the e Reuse Methodology (eRM). The main goal of verification is, after all, finding more bugs quicker using given resources, and verification reuse (module-to-system, old-system-to-new-...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Iman, Sasan (Συγγραφέας), Joshi, Sunita (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2004.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03872nam a22005295i 4500
001 978-1-4020-8024-1
003 DE-He213
005 20151204170425.0
007 cr nn 008mamaa
008 100301s2004 xxu| s |||| 0|eng d
020 |a 9781402080241  |9 978-1-4020-8024-1 
024 7 |a 10.1007/b117092  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UY  |2 bicssc 
072 7 |a UYA  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 004.0151  |2 23 
100 1 |a Iman, Sasan.  |e author. 
245 1 4 |a The e Hardware Verification Language  |h [electronic resource] /  |c by Sasan Iman, Sunita Joshi. 
264 1 |a Boston, MA :  |b Springer US,  |c 2004. 
300 |a XXII, 349 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Verification Methodologies and Environment Architecture -- Verification Methodologies -- Anatomy of a Verification Environment -- All About e -- e as a Programming Language -- e as a Verification Language -- Topology and Stimulus Generation -- Generator Operation -- Data Modeling and Stimulus Generation -- Sequence Generation -- Response Collection, Data Checking, and Property Monitoring -- Temporal Expressions -- Messages -- Collectors and Monitors -- Scoreboarding -- Coverage Modeling and Measurement -- Coverage Engine -- Coverage Modeling -- e Code Reuse -- e Reuse Methodology -- si_util Package. 
520 |a I am glad to see this new book on the e language and on verification. I am especially glad to see a description of the e Reuse Methodology (eRM). The main goal of verification is, after all, finding more bugs quicker using given resources, and verification reuse (module-to-system, old-system-to-new-system etc. ) is a key enabling component. This book offers a fresh approach in teaching the e hardware verification language within the context of coverage driven verification methodology. I hope it will help the reader und- stand the many important and interesting topics surrounding hardware verification. Yoav Hollander Founder and CTO, Verisity Inc. Preface This book provides a detailed coverage of the e hardware verification language (HVL), state of the art verification methodologies, and the use of e HVL as a facilitating verification tool in implementing a state of the art verification environment. It includes comprehensive descriptions of the new concepts introduced by the e language, e language syntax, and its as- ciated semantics. This book also describes the architectural views and requirements of verifi- tion environments (randomly generated environments, coverage driven verification environments, etc. ), verification blocks in the architectural views (i. e. generators, initiators, c- lectors, checkers, monitors, coverage definitions, etc. ) and their implementations using the e HVL. Moreover, the e Reuse Methodology (eRM), the motivation for defining such a gui- line, and step-by-step instructions for building an eRM compliant e Verification Component (eVC) are also discussed. 
650 0 |a Computer science. 
650 0 |a Computers. 
650 0 |a Computer-aided engineering. 
650 0 |a Electrical engineering. 
650 0 |a Electronic circuits. 
650 1 4 |a Computer Science. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Circuits and Systems. 
650 2 4 |a Electrical Engineering. 
650 2 4 |a Computer-Aided Engineering (CAD, CAE) and Design. 
700 1 |a Joshi, Sunita.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781402080234 
856 4 0 |u http://dx.doi.org/10.1007/b117092  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)