Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post-Silicon Validation and Debug

Buy
Post-Silicon Validation and Debug, 9783319981154 (3319981153), Springer, 2018

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how they can be effectively utilized to verify and debug SoCs. 

In our day-to-day activities, we interact with a wide variety of computing systems. When we use desktops or laptops, we are aware of the fact that these systems are computing something for us. However, in many systems, the computing is embedded in them, such as cyber-physical systems and Internet-of-Things (IoT) devices. When we drive a car or fly in an airplane, many computing devices seamlessly work together to ensure a pleasant and safe journey. Similarly, when we perform any financial transaction or share personal details using a smartphone, embedded computing devices try to ensure the security and privacy of these transactions. Can we assume that these computing devices are correct by con- struction and therefore we can safely rely on them? A short answer is that no one can prove the absolute infallibility of today’s computing systems. This book pro- vides a clear insight into the fundamental challenges associated with validation and debug of computing systems. This book also provides effective solutions to address these challenges.

Most of these computing systems consist of software (application programs), firmware, and hardware. The brain behind these computing systems is called System-on-Chip (SoC). A typical SoC includes one or more processor cores, coprocessors, caches, memory, controllers, converters, peripherals, input/output devices, sensors, and so on. To understand why SoC validation is so challenging, let us consider one of the simplest components in a SoC—an adder. An adder adds two input values and produces the result. Typically, the input values are 64-bit integers. Therefore, to verify this adder, we have to simulate several trillions (2 64 ? 2 64 ) of test vectors. Clearly, it is infeasible to apply trillions of test vectors to verify an adder. If we cannot completely verify a simple adder, what is the hope that we can verify complex SoCs. During the design stage (before fabrication), pre-silicon validation techniques try to identify and fix functional errors as well as nonfunctional requirements.
(HTML tags aren't allowed.)

Metrics and Models in Software Quality Engineering, Second Edition
Metrics and Models in Software Quality Engineering, Second Edition

"This is the single best book on software quality engineering and metrics that I've encountered."-Capers Jones, from the Foreword

Metrics and Models in Software Quality Engineering, Second Edition, is the definitive book on this essential topic of software...

Network Consultant's Handbook
Network Consultant's Handbook
A complete resource for assessing, auditing, analyzing, and evaluating any network environment

With Network Consultants Handbook, you will

  • Learn from network audit and evaluation guidelines that aid in data gathering and analysis of network environments
  • Work with tables and...
IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...


Sams Teach Yourself Wireless Java with J2ME in 21 Days
Sams Teach Yourself Wireless Java with J2ME in 21 Days

Sams Teach Yourself Wireless Java with J2ME in 21 Days begins by establishing the basic parameters of J2ME development and its uses in building wireless applications. The tutorial chapters introduce both text and graphical application development for typical wireless devices. Finally, the book presents the major types of...

Web Application Architecture: Principles, Protocols and Practices
Web Application Architecture: Principles, Protocols and Practices
It is no longer enough for Web application developers to be proficient in just one platform. As platforms grow and evolve and new ones arise, developers must be able to transfer their proficiency across platforms in order to design, develop and debug complex Web applications effectively. This book uncovers the underlying core technologies that...
Heavy Metals In The Environment
Heavy Metals In The Environment
[In this book,] 48 eminently qualified professionals present a well-balanced discussion of the pertinent risk and benefit issues. What is presented is a factual analysis of the perspective that there are both nutritional and toxicological aspects that require consideration. … This book definitely provides valuable information in a very...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy