A system verification strategy based on the BST infrastructure
نویسندگان
چکیده
A good verification strategy should bring near the simulation and real functioning environments. In this paper we describe a system-level co-verification strategy that uses a common flow for functional simulation, timing simulation and functional debug. This last step requires using a BST infrastructure, now widely available on commercial devices, specially on FPGAs with medium/large pin-counts.
منابع مشابه
Measurement of the immobilisation efficacy of a head fixation system
Background: In order to assign appropriate planning target volume (PTV) margins, each centre should measure the patient positioning deviations for their set-up techniques. At the Royal Marsden Hospital, UK, a conformal shell (cast) system is used when a stereotactic frame is not suitable. In this paper, we report on a series of measurements with the aim of obtaining the systematic and random ...
متن کاملThe effect of glutaminergic system on cardiovascular regulation of rat
Introduction: The bed nucleus stria terminalis (BST) is a part of the limbic system, which plays a role in regulation of heart beat and blood circulation. It was recently shown that microinjection of L-glutamate in the BST elicits cardiovascular depressive, but the role of glutamate receptor subtypes has not been investigated yet. In this study, the role of glutamate receptor subgroups in regul...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA New Approach to Deploying Knowledge Management System Based on Organizational Infrastructure Variables in Human Resources Management of Iranian Oil Industry
Purpose of this research was to structure the problem of establishing a knowledge management system in Oil industry using a combination of factor analysis and DEMATEL approach to identifying the effective factors in the form of causal relationships to understand planners from the problem position and visualization of structures a complex relationship between factors. Firstly, the organization...
متن کامل