000 | 12056cam a2200373Ia 4500 | ||
---|---|---|---|
001 | u8393 | ||
003 | SA-PMU | ||
005 | 20210418123156.0 | ||
008 | 050628s2005 ne a b 001 0 eng d | ||
010 | _a 2005299338 | ||
040 |
_aPIT _beng _cPIT _dOCLCQ _dDLC _dBAKER _dLVB _dYDXCP _dBTCTA _dNLGGC _dOCLCG _dBDX _dHDC _dSGB _dOCLCF |
||
020 | _a0127518037 | ||
020 | _a9780127518039 | ||
035 | _a(OCoLC)60756339 | ||
050 | 0 | 0 |
_aTK7874.58 _b.W55 2005 |
082 | 0 | 0 |
_a621.3815/48 _222 |
100 | 1 | _aWile, Bruce. | |
245 | 1 | 0 |
_aComprehensive functional verification the complete industry cycle / _cBruce Wile, John C. Goss, Wolfgang Roesner. |
260 |
_aAmsterdam ; _aBoston : _bElsevier/Morgan Kaufmann, _cc2005. |
||
300 |
_axiii, 676 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references (p. 657-662) and index. | ||
505 | 0 | 0 |
_gPart I _tIntroduction to Verification -- _g1 _tVerification in the Chip Design Process _g5 -- _g1.1 _tIntroduction to Functional Verification _g5 -- _g1.2 _tThe Verification Challenge _g8 -- _g1.2.1 _tThe Challenge of State Space Explosion _g9 -- _g1.2.2 _tThe Challenge of Detecting Incorrect Behavior _g12 -- _g1.3 _tMission and Goals of Verification _g14 -- _g1.3.1 _tVerification Engineer "Musts" _g18 -- _g1.4 _tCost of Verification _g20 -- _g1.4.1 _tEngineering Costs and the Need for an Independent Verification Team _g20 -- _g1.4.2 _tDesign Automation Tools _g21 -- _g1.4.3 _tTime _g22 -- _g1.5 _tAreas of Verification Beyond the Scope of this Book _g23 -- _g1.6 _tThe Verification Cycle: A Structured Process _g24 -- _g1.6.1 _tFunctional Specification _g25 -- _g1.6.2 _tCreate Verification Plan _g26 -- _g1.6.3 _tDevelop Environment _g27 -- _g1.6.4 _tDebug HDL and Environment _g27 -- _g1.6.5 _tRegression _g28 -- _g1.6.6 _tFabricate Hardware _g28 -- _g1.6.7 _tDebug Fabricated Hardware (Systems Test) _g29 -- _g1.6.8 _tEscape Analysis _g29 -- _g1.6.9 _tCommon Verification Cycle Breakdowns _g30 -- _g2 _tVerification Flow _g35 -- _g2.1 _tVerification Hierarchy _g35 -- _g2.1.1 _tLevels of Verification _g36 -- _g2.1.2 _tWhat Level to Choose? _g41 -- _g2.2 _tStrategy of Verification _g45 -- _g2.2.1 _tDriving Principles _g45 -- _g2.2.2 _tChecking Strategies _g50 -- _g2.2.3 _tChecking the Black Box _g55 -- _g2.2.5 _tThe General Simulation Environment _g61 -- _g2.2.6 _tVerification Methodology Evolution _g62 -- _g3 _tFundamentals of Simulation Based Verification _g73 -- _g3.1 _tBasic Verification Environment: A Test Bench _g73 -- _g3.1.1 _tStimulus Component _g74 -- _g3.1.2 _tMonitor _g80 -- _g3.1.3 _tChecker _g82 -- _g3.1.4 _tScoreboard _g83 -- _g3.1.5 _tDesign Under Verification _g85 -- _g3.2 _tObservation Points: Black-Box, White-Box and Grey-Box Verification _g86 -- _g3.2.1 _tBlack Box _g86 -- _g3.2.2 _tWhite Box _g87 -- _g3.2.3 _tGrey Box _g88 -- _g3.3 _tAssertion Based Verification-An Overview _g89 -- _g3.3.1 _tThe Importance of Assertions _g90 -- _g3.3.2 _tAssertions Express Design Intent _g92 -- _g3.3.3 _tClassification of Assertions _g94 -- _g3.4 _tTest Benches and Testing Strategies _g95 -- _g3.4.1 _tDeterministic Test Benches _g95 -- _g3.4.2 _tSelf-Checking Test Benches _g97 -- _g4 _tThe Verification Plan _g103 -- _g4.1 _tThe Functional Specification _g103 -- _g4.2 _tThe Evolution of the Verification Plan _g104 -- _g4.3 _tContents of the Verification Plan _g106 -- _g4.3.1 _tDescription of Verification Levels _g106 -- _g4.3.2 _tRequired Tools _g107 -- _g4.3.3 _tRisks and Dependencies _g108 -- _g4.3.4 _tFunctions to be Verified _g109 -- _g4.3.5 _tSpecific Tests and Methods: Environment _g111 -- _g4.3.6 _tCoverage Requirements _g115 -- _g4.3.7 _tTest Case Scenarios: Matrix _g116 -- _g4.3.8 _tResource Requirements _g117 -- _g4.3.9 _tSchedule Details _g118 -- _g4.4 _tVerification Example: Calc1 _g121 -- _g4.4.1 _tDesign Description _g121 -- _g4.4.2 _tCreating the Verification Plan for Calc1 _g125 -- _g4.4.3 _tDeterministic Verification of Calc1 _g131 -- _gPart II _tSimulation Based Verification -- _g5 _tHDLs and Simulation Engines _g141 -- _g5.1 _tHardware Description Languages _g143 -- _g5.1.1 _tHDL Modeling Levels _g143 -- _g5.1.2 _tVerification Aspects of HDLs _g153 -- _g5.2 _tSimulation Engines: Introduction _g159 -- _g5.2.1 _tSpeed versus Accuracy _g160 -- _g5.2.2 _tMaking the Right Methodology Choices _g162 -- _g5.3 _tEvent-Driven Simulation _g162 -- _g5.3.1 _tHierarchical Model Network _g163 -- _g5.3.2 _tModel Evaluation Over Time _g165 -- _g5.3.3 _tEvent-Driven Control of Model Evaluation _g167 -- _g5.3.4 _tImplementation Sketch of an Event-Driven Simulation Engine _g172 -- _g5.4 _tImproving Simulation Throughput _g178 -- _g5.5 _tCycle-Based Simulation _g182 -- _g5.5.1 _tSynchronous Design _g183 -- _g5.5.2 _tThe Cycle-Based Simulation Algorithm _g184 -- _g5.5.3 _tExtensions to Basic Cycle-Based Simulation Engines _g188 -- _g5.6 _tWaveform Viewers _g191 -- _g6 _tCreating Environments _g199 -- _g6.1 _tTest Bench Writing Tools _g200 -- _g6.1.1 _tHDL Languages as Test Bench Tool _g201 -- _g6.1.2 _tC/C++ Libraries _g207 -- _g6.1.3 _tHigh-Level Verification Languages _g230 -- _g6.1.4 _tOther Test Bench Tools _g241 -- _g6.2 _tVerification Coverage _g243 -- _g6.2.2 _tFunctional Verification Test Coverage versus Manufacturing Test Coverage _g246 -- _g6.2.3 _tStructural Coverage _g247 -- _g6.2.4 _tFunctional Coverage _g251 -- _g6.2.5 _tCoverage Bulk Data Collection and Management _g254 -- _g6.2.6 _tThe Right Coverage Analysis Strategy _g255 -- _g7 _tStrategies for Simulation-Based Stimulus Generation _g259 -- _g7.1 _tCalc2 Overview _g260 -- _g7.1.1 _tCalc2 Verification Plan _g263 -- _g7.1.2 _tCalc2 and the Strategies for Stimulus Generation _g269 -- _g7.2 _tStrategies for Stimulus Generation _g270 -- _g7.2.1 _tTypes of Stimulus Generation _g270 -- _g7.2.2 _tGeneral Algorithms for Stimulus Components _g275 -- _g7.2.3 _tApplying the Four Types of Stimulus Generation to Calc2 _g277 -- _g7.2.4 _tSeeding Random Test Cases _g294 -- _g7.2.5 _tConstraint Solving in Random Environments _g297 -- _g7.2.6 _tCoverage Techniques in Random Environments _g301 -- _g7.2.7 _tMaking Rare Events Occur _g303 -- _g7.2.8 _tStimulus Generation of Deadlocks and Livelocks _g306 -- _g8 _tStrategies for Results Checking in Simulation-Based Verification _g313 -- _g8.1 _tTypes of Result Checking _g313 -- _g8.1.1 _tOn-the-Fly Checking versus End-of-Test Case Checking _g314 -- _g8.1.2 _tPregenerated Test Cases versus On-the-Fly Generated Test Cases _g321 -- _g8.1.3 _tApplying the Checking Strategies to Calc2 _g322 -- _g8.2 _tDebug _g334 -- _g8.2.1 _tDebug Process _g336 -- _g8.2.2 _tHow Different Types of Test Benches Affect Debug _g349 -- _g9 _tPervasive Function Verification _g355 -- _g9.1 _tSystem Reset and Bring-Up _g356 -- _g9.1.1 _tReset Line Initialization _g357 -- _g9.1.2 _tScan Initialization _g361 -- _g9.1.3 _tTestability and Built-In Self-Test _g363 -- _g9.2 _tError and Degraded Mode Handling _g368 -- _g9.2.1 _tVerifying Error Detection _g368 -- _g9.2.2 _tVerifying Self-Healing Hardware _g372 -- _g9.3 _tVerifying Hardware Debug Assists _g380 -- _g9.3.1 _tVerifying Scan Ring Dumps _g381 -- _tLow Power Mode Verification _g384 -- _g9.4.1 _tPower Savings Through Disabling Functional Units _g385 -- _g9.4.2 _tPower Savings Through Cycle Time Degradation _g387 -- _g10 _tRe-Use Strategies and System Simulation _g391 -- _g10.1 _tRe-Use Strategies _g392 -- _g10.1.1 _tGuidelines for Re-Use _g395 -- _g10.1.2 _tHorizontal Re-Use _g403 -- _g10.1.3 _tVertical Re-Use _g404 -- _g10.1.4 _tApplying Re-Use to Calc2 _g405 -- _g10.1.5 _tAssertion Re-Use _g410 -- _g10.2 _tSystem Simulation _g412 -- _g10.2.1 _tSystem Test Bench _g412 -- _g10.2.2 _tConnectivity and Interaction of Units _g414 -- _g10.2.3 _tVerification Challenges in a Re-Usable IP World _g418 -- _g10.3 _tBeyond General-Purpose Logic Simulation _g420 -- _g10.3.1 _tAcceleration _g421 -- _g10.3.2 _tEmulation _g427 -- _g10.3.3 _tHardware/Software Co-verification _g428 -- _g10.3.4 _tCo-simulation _g430 -- _gPart III _tFormal Verification -- _g11 _tIntroduction to Formal Verification _g439 -- _g11.1.1 _tDesign Correctness and Specifications _g441 -- _g11.1.2 _tComputational Complexity _g443 -- _g11.1.3 _tThe Myth of Linear Scaling of Simulation _g445 -- _g11.1.4 _tMathematical Proof Methods in Formal Verification _g446 -- _g11.2 _tFormal Boolean Equivalence Checking _g448 -- _g11.2.1 _tThe Role of Equivalence Checking in the VLSI Design Flow _g449 -- _g11.2.2 _tMain Elements of an Equivalence Checker Tool _g450 -- _g11.2.3 _tSequential and Combinational Boolean Equivalence Checking _g451 -- _g11.2.4 _tCore Algorithms for Combinational Equivalence Checking _g454 -- _g11.2.5 _tBlueprint of a Modern Equivalence Checking Tool _g465 -- _g11.3 _tFunctional Formal Verification-Property Checking _g467 -- _g11.3.1 _tProperty Checking vs. |
505 | 0 | 0 |
_tSequential Equivalence Checking _g468 -- _g11.3.2 _tThe Myth of Complete Verification with FV _g470 -- _g11.3.3 _tProperties for an Example Design _g471 -- _g11.3.4 _tDUV Drivers for Formal Verification _g476 -- _g11.3.5 _tState Space Traversal and Temporal Logic _g479 -- _g11.3.6 _tFunctional Formal Verification Tool Flow _g483 -- _g12 _tUsing Formal Verification _g487 -- _g12.1 _tProperty Specification Using an HDL Library _g488 -- _g12.1.1 _tThe Open Verification Library (OVL) _g489 -- _g12.1.2 _tUsing OVL to Specify Properties _g495 -- _g12.2 _tThe Property Specification Language PSL _g499 -- _g12.2.2 _tThe Boolean Layer of PSL _g501 -- _g12.2.3 _tThe Temporal Layer of PSL _g504 -- _g12.2.4 _tThe Verification Layer of PSL _g508 -- _g12.2.5 _tThe Modeling Layer of PSL _g511 -- _g12.2.6 _tUsing PSL to Specify Properties _g512 -- _g12.2.7 _tAdvanced PSL Topics and Caveats _g514 -- _g12.3 _tProperty Checking Using Formal Verification _g521 -- _g12.3.1 _tProperty Re-Use between Simulation and FV _g521 -- _g12.3.2 _tModel Compliation _g522 -- _g12.3.3 _tFormal Functional Verification Algorithms _g523 -- _g12.3.4 _tSolutions to Address the Problem of State Space Explosion _g527 -- _g12.3.5 _tSemi-Formal Verification _g530 -- _g12.3.6 _tEDA Vendors Supplying Formal and Semi-Formal Verification Tools _g532 -- _gPart IV _tComprehensive Verification -- _g13 _tCompleting the Verification Cycle _g539 -- _g13.1 _tRegression _g540 -- _g13.1.1 _tRegression in the Verification Flow _g540 -- _g13.1.2 _tRegression Quality _g542 -- _g13.1.3 _tRegression Efficiency _g543 -- _g13.2 _tProblem Tracking _g548 -- _g13.3 _tTape-Out Readiness _g552 -- _g13.3.1 _tMetrics _g552 -- _g13.3.2 _tCompletion Criteria _g557 -- _g13.4 _tEscape Analysis _g559 -- _g13.4.1 _tIndividual Bug Analysis _g561 -- _g13.4.2 _tEscape Examples _g569 -- _g13.4.3 _tEscape Analysis Trends _g572 -- _g14 _tAdvanced Verification Techniques _g579 -- _g14.1 _tSave Verification Cycles-Bootstrapping the Verification Process _g580 -- _g14.1.1 _tSeparating POR and Mainline Verification _g580 -- _g14.1.2 _tBootstrapping the DUV into High-Potential States _g583 -- _g14.1.3 _tManipulating the DUV Specification Provoking States of Resource Conflict _g585 -- _g14.2 _tHigh-Level Modeling-Concepts _g586 -- _g14.2.1 _tApplications of the High-Level Model _g587 -- _g14.2.2 _tHigh-Level Modeling Styles _g590 -- _g14.3 _tCoverage-Directed Generation _g595 -- _g15.1 _tThe Line Delete Escape _g603 -- _g15.1.1 _tThe Background _g603 -- _g15.1.2 _tThe Verification Environments _g605 -- _g15.1.3 _tThe Escape _g607 -- _g15.2 _tBranch History Table _g608 |
520 | _aA key strength of this book is that it describes the entire verification cycle and details each stage. The organization of the book follows the cycle, demonstrating how functional verification engages all aspects of the overall design effort and how individual cycle stages relate to the larger design process. Throughout the text, the authors leverage their 35 plus years experience in functional verification, providing examples and case studies, and focusing on the skills, methods, and tools needed to complete each verification task. Additionally, the major vendors (Mentor Graphics, Cadence Design Systems, Verisity, and Synopsys) have implemented key examples from the text and made these available on line, so that the reader can test out the methods described in the text. | ||
650 | 0 |
_aIntegrated circuits _xVerification. |
|
650 | 0 | _aComputer engineering. | |
700 | 1 | _aGoss, John C. | |
700 | 1 |
_aRoesner, W. _q(Wolfgang) |
|
856 | 4 | 2 |
_3Publisher description _uhttp://catdir.loc.gov/catdir/enhancements/fy0627/2005299338-d.html |
856 | 4 | 1 |
_3Table of contents _uhttp://catdir.loc.gov/catdir/enhancements/fy0627/2005299338-t.html |
942 | _cBOOK | ||
994 |
_aZ0 _bSUPMU |
||
596 | _a1 2 | ||
999 |
_c1915 _d1915 |