The e Hardware Verification Language by Sasan Iman, Sunita Joshi.

Saved in:
Bibliographic Details
Main Authors: Iman, Sasan (Author), Joshi, Sunita (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2004.
Edition:1st ed. 2004.
Series:Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3203095
003 MWH
005 20191025131858.0
007 cr nn 008mamaa
008 100301s2004 xxu| s |||| 0|eng d
020 |a 9781402080241 
024 7 |a 10.1007/b117092  |2 doi 
035 |a (DE-He213)978-1-4020-8024-1 
050 4 |a E-Book 
072 7 |a UY  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a UY  |2 thema 
072 7 |a UYA  |2 thema 
100 1 |a Iman, Sasan.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 4 |a The e Hardware Verification Language  |h [electronic resource] /  |c by Sasan Iman, Sunita Joshi. 
250 |a 1st ed. 2004. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2004. 
300 |a XXII, 349 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Springer eBook Collection 
505 0 |a Verification Methodologies and Environment Architecture -- Verification Methodologies -- Anatomy of a Verification Environment -- All About e -- e as a Programming Language -- e as a Verification Language -- Topology and Stimulus Generation -- Generator Operation -- Data Modeling and Stimulus Generation -- Sequence Generation -- Response Collection, Data Checking, and Property Monitoring -- Temporal Expressions -- Messages -- Collectors and Monitors -- Scoreboarding -- Coverage Modeling and Measurement -- Coverage Engine -- Coverage Modeling -- e Code Reuse -- e Reuse Methodology -- si_util Package. 
520 |a I am glad to see this new book on the e language and on verification. I am especially glad to see a description of the e Reuse Methodology (eRM). The main goal of verification is, after all, finding more bugs quicker using given resources, and verification reuse (module-to-system, old-system-to-new-system etc. ) is a key enabling component. This book offers a fresh approach in teaching the e hardware verification language within the context of coverage driven verification methodology. I hope it will help the reader und- stand the many important and interesting topics surrounding hardware verification. Yoav Hollander Founder and CTO, Verisity Inc. Preface This book provides a detailed coverage of the e hardware verification language (HVL), state of the art verification methodologies, and the use of e HVL as a facilitating verification tool in implementing a state of the art verification environment. It includes comprehensive descriptions of the new concepts introduced by the e language, e language syntax, and its as- ciated semantics. This book also describes the architectural views and requirements of verifi- tion environments (randomly generated environments, coverage driven verification environments, etc. ), verification blocks in the architectural views (i. e. generators, initiators, c- lectors, checkers, monitors, coverage definitions, etc. ) and their implementations using the e HVL. Moreover, the e Reuse Methodology (eRM), the motivation for defining such a gui- line, and step-by-step instructions for building an eRM compliant e Verification Component (eVC) are also discussed. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computers. 
650 0 |a Electronic circuits. 
650 0 |a Electrical engineering. 
650 0 |a Computer-aided engineering. 
690 |a Electronic resources (E-books) 
700 1 |a Joshi, Sunita.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/b117092  |3 Click to view e-book 
907 |a .b32030952  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g xxu  |h 4  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21162591  |z 02-26-20 
999 f f |i 306f5880-d964-5713-a42d-2c3d731dfaf9  |s 1da9c220-793e-5139-b289-dc5bc1797ace 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |e E-Book  |h Library of Congress classification  |i Elec File  |n 1