Search Results

Filters
Reset All

Filters

Topic

Show More

Show Less

Content Type

Show More

Show Less

Audience

Tags

Show More

Show Less

1776 Results

  • Explore How to Protect Against Data Corruption with Formal Security Verification

    In this session, you will learn about the importance of hardware security including; why robust hardware security is fundamental to all security applications, especially as hardware forms the backbone of critical systems and the implications of hardware breaches, which can lead to severe financial, reputational, and operational consequences.

  • Verification Academy Live: Silicon Valley

    Verification IP for UCIe, PCIe Gen 7, HBM4, and more Thursday, January 30th | 9:30 AM - 3:30 PM | Fremont, CA This seminar will show how to leverage next-gen verification IP to rapidly verify high-performance protocol designs being employed on today's 3DICs and SoCs.

  • Streamlining FPU Verification with an Alternative to C-reference Model Approaches

    In this session, you will be introduced to the Questa FPU application, explaining how it can quickly detect design inconsistencies and reduce verification time from months to days (based on an easy setup process).In this session, you will learn how Questa Formal Verification IP (VIP) for the AMBA protocol ensures that designs incorporating AMBA adhere strictly to the protocol; all without the need for simulation.

  • Unlocking the Power of QuestaSim and Visualizer Integration

    In this session, you will learn how you can get faster simulation runs, smaller simulation databases. We will also cover qrun which simplifies your scripting environment by bringing together compilation, optimization and elaboration into a single command and fewer switches. Then we will cover how you can get better coverage performance using our Next-Gen Coverage engine.

  • osmosis 2024 – pushing the boundaries of formal verification

    The annual osmosis 2024 event has once again proved to be a powerful platform for advancing the field of verification. With a compelling agenda focused on integrating formal methods with simulation, automation, and emerging architectures, we gathered industry leaders and experts to explore cutting-edge solutions in verification.

  • Boost Your Verification Productivity with Questa Verification IQ

    This session will explore Questa Verification IQ (VIQ), Siemens EDA’s next-generation collaborative and data-driven verification solution. VIQ revolutionizes the verification process by providing advanced analytics, enhanced collaboration, and comprehensive traceability. By leveraging machine learning, VIQ significantly enhances verification efficiency to boost your productivity.

  • Boost Your Verification Productivity with Questa Verification IQ

    In this webinar, you will learn how to implement a collaborative, plan-driven verification process, complemented by a requirement-driven process for complete traceability from requirements to implementation and verification results.

  • Ensuring Robust Reset Integrity in Complex SoC Designs Through Advanced Reset Tree Checks

    One of the foundational steps in the reset domain crossing (RDC) verification process is determining the structure of the reset tree within a system-on-chip (SoC) design. The reset tree is critical for tracking how reset signals propagate throughout the design, ensuring stable and predictable system operation. To construct this reset tree, engineers rely on static analysis techniques to examine the register transfer level (RTL) of the design and identify various reset signals.

  • Effective Identification of Reset Tree Bugs to Mitigate RDC Issues

    This paper discusses these advanced structural checks, explaining how they are crucial for identifying potential issues early and ensuring the integrity of SoC designs.

  • Effective Identification of Reset Tree Bugs to Mitigate RDC Issues

    This paper emphasizes the importance of advanced reset tree structural checks to identify potential design issues prior to conducting RDC analysis. By doing so, these checks can significantly conserve both the time and effort expended by designers throughout the overall RDC verification process. This paper advocates for early detection and correction of such issues, underlining how advanced reset tree checks can enhance the integrity and reliability of SoC designs.

  • Unlocking Performance: How Computational Storage Transforms Data Processing

    Computational storage devices (CSD) represent a paradigm shift in how data processing and storage are handled in modern data centers, providing significant benefits for applications requiring large-scale data manage­ment and real-time analytics.

  • Accelerating Verification Closure with Siemens DFT Tailored Verification Solutions

    This session details how Siemens DFT centric verification technology tackles these challenges by providing a unified platform streamlined to Tessent flows, delivering industry leading performance and enhanced user experience, accelerating DFT verification closure while reducing cost and risk to reach DFT sign-off.

  • Capturing Additional DFT Coverage thru Functional Fault Grading

    Today’s Semiconductors often target a manufacturing test coverage in excess of 99%. This target is particularly important for chips used in safety critical applications. However, there are usually a small number of faults that cannot be covered by structural testing. Functional Fault Grading provides a methodology to capture additional manufacturing test coverage without modifying the existing DFT architecture.

  • The New Leader in Verification IP: Questa + Avery Solution

    Now that our acquisition of Avery Design Systems is complete, Siemens EDA is the new leader for Verification IP in the industry. This session will describe the protocol and memory verification solutions you need for your next silicon verification project whether in Datacenter, Storage, 3DIC, Networking, Automotive, or Aerospace and Defense applications.

  • Questa Verification IQ: Boost verification predictability and efficiency with Big Data

    VIQ is a collaborative, browser-based, data-driven platform that revolutionizes the verification process. By harnessing the power of machine learning, VIQ delivers advanced analytics, enhanced collaboration capabilities, and comprehensive traceability. This innovative approach significantly boosts verification efficiency, empowering you to maximize your productivity.

  • Unlocking the Future of High Bandwidth Memory with Siemens and Rambus

    HBM4 , the next-generation memory technology, is nearing finalization by JEDEC and promises to push the boundaries of data rate, 3D stack height, and DRAM chip density. This evolution from HBM3 to HBM4 means even higher bandwidth and greater device capacity, making it indispensable for the growing demands of AI and HPC applications.

  • Verifying the Next Generation High Bandwidth Memory Controllers for AI and HPC Applications

    High Bandwidth Memory (HBM) has revolutionized AI, machine learning, and High-Performance Computing by significantly increasing data transfer speeds and alleviating performance bottlenecks. The introduction of next-generation HBM4 is especially transformative, enabling faster training and execution of complex AI models. JEDEC has announced that the HBM4 specification is nearing finalization.

  • Verifying the Next Generation High Bandwidth Memory Controllers for AI and HPC Applications

    In this session, you will learn how Siemens’s scalable and customizable Avery HBM Verification IP helps companies like Rambus verify their industry-leading HBM4 Controller IP through rigorous testing to ensure reliability and performance.

  • Analyze Architecture for Next Level Formal Unreachability Analysis

  • Analyze Architecture for Next Level Formal Unreachability Analysis

  • Automated Coverage Exclusions with Increase Coverage

  • Automated Coverage Exclusions with Increase Coverage

  • Designing Secure and Performant Out-of-Order Processors Enabled by Formal Verification

  • Designing Secure and Performant Out-of-Order Processors Enabled by Formal Verification

  • Comprehensive Flow for Ensuring Integrity and Security Through Formal Verification