A system verification strategy based on the BST infrastructure

نویسندگان

  • Gustavo Ribeiro Alves
  • José M. M. Ferreira
چکیده

A good verification strategy should bring near the simulation and real functioning environments. In this paper we describe a system-level co-verification strategy that uses a common flow for functional simulation, timing simulation and functional debug. This last step requires using a BST infrastructure, now widely available on commercial devices, specially on FPGAs with medium/large pin-counts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measurement of the immobilisation efficacy of a head fixation system

Background: In order to assign appropriate planning target volume (PTV) margins, each centre should measure the patient positioning deviations for their set-up techniques. At the Royal Marsden Hospital, UK, a conformal shell (cast) system is used when a stereotactic frame is not suitable. In this paper, we report on a series of measurements with the aim of obtaining the systematic and random ...

متن کامل

The effect of glutaminergic system on cardiovascular regulation of rat

Introduction: The bed nucleus stria terminalis (BST) is a part of the limbic system, which plays a role in regulation of heart beat and blood circulation. It was recently shown that microinjection of L-glutamate in the BST elicits cardiovascular depressive, but the role of glutamate receptor subtypes has not been investigated yet. In this study, the role of glutamate receptor subgroups in regul...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

A New Approach to Deploying Knowledge Management System Based on Organizational Infrastructure Variables in Human Resources Management of Iranian Oil Industry

Purpose of this research was to structure the problem of establishing a knowledge management system in Oil industry using a combination of factor analysis and DEMATEL approach to identifying the effective factors in the form of causal relationships to understand planners from the problem position and visualization of structures a complex relationship between factors. Firstly, the organization...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999