Quantcast
Channel: Cadence Functional Verification
Browsing all 652 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

My First Internet of Things Device: Moving from a Manual to an Automated...

The Internet of Things (IoT) has been a buzzword for quite some time now. However, thus far it has not seen wide adoption or market penetration in the home; this, at least, has been my observation....

View Article


Image may be NSFW.
Clik here to view.

Troubleshooting Incisive Errors/Warnings—nchelp/ncbrowse and Cadence Online...

I joined Cadence in July 2000 and was immediately put on a three-month training to learn and understand the simulator tools. There were formal training sessions, and I had a mentor who I could ask all...

View Article


Image may be NSFW.
Clik here to view.

Transferring e "when" Subtypes to UVM SV via TLM Ports—UVM-ML OA Package

The UVM-ML OA (Universal Verification Methodology - Multi-Language - Open Architecture) package features the ability to transfer objects from one verification framework to another via multi-language...

View Article

Image may be NSFW.
Clik here to view.

e and SystemVerilog: The Ultimate Race

For years we've watched the e and SystemVerilog race via countless presentations, articles, and blogs. Each language is applied to SoC verification yet the differences are well documented so any...

View Article

Image may be NSFW.
Clik here to view.

Pretty Fly For an Old Feature—Discovering Existing But Unknown Incisive...

It is the year 2014. We live in a highly mobile, wireless world, supported by cloud and associated network infrastructure. Therefore, the use of physical media, such as CDs, DVDs, BlueRay discs, and so...

View Article


Image may be NSFW.
Clik here to view.

Generic Dynamic Runtime Operations With e Reflection - Part 3: Additional...

 This post concludes the series of blog posts that discuss the dynamic capabilities of the Reflection API in e. Part one described the basics of generic value assignments and retrievals, using untyped...

View Article

Image may be NSFW.
Clik here to view.

Generic dynamic run-time operations with e reflection Part II

Field access and method invocationsIn the previous blog, we explained what are untyped variables and value holders in e, and how to assign and retrieve values to/from them. In this and the next blogs,...

View Article

Image may be NSFW.
Clik here to view.

Transferring e "when" Subtypes to UVM SV via TLM Ports—UVM-ML OA Package

The UVM-ML OA (Universal Verification Methodology - Multi-Language - Open Architecture) package features the ability to transfer objects from one verification framework to another via multi-language...

View Article


Image may be NSFW.
Clik here to view.

Time to Play - You Can Now Run Your e Code on EDAplayground

Over the years I've often hoped to have the ability to show someone (a customer, or one of our field engineers) a bit of e code, and explain what it actually does. People say that a picture speaks more...

View Article


Image may be NSFW.
Clik here to view.

Dealing with Specman-Simulator Interface Issues—Get Ready to Cook!

Two great documents, aiming to make life easier for a verification engineer, were published in the past year. Written by Cadence support specialists with years of experience in problem solving, these...

View Article

Image may be NSFW.
Clik here to view.

Updates from the UVM Multi-Language (ML) Front

An updated version of the UMV-ML Open Architecture library is now available on the Accellera uploads page (you need to login in order to download any of the contributions).The main updates of version...

View Article

Image may be NSFW.
Clik here to view.

Connected Field Sets – What Are Those and Why Should I Care?

Right form the start Specman has been very good at generating constrained random stimulus. Value generation guided by constraints is achieved with an algorithm within Specman that is at the very core...

View Article

Image may be NSFW.
Clik here to view.

Using Generative List Pseudo Methods in Constraints – A Case Study

This article highlights the use of list pseudo-methods constraining the content of lists, which is relatively new and offers a lot of power in terms of modelling, performance, and...

View Article


Image may be NSFW.
Clik here to view.

How I First Heard About Sebastian Thrun and Udacity

 Before my wife became a writer, she was a director at Massachusetts General Hospital. In this position she met a lot of interesting people. Among them was Dr. Thomas Bernard Kinane, a pediatric...

View Article

Image may be NSFW.
Clik here to view.

Satisfy Your Need for Verification Speed—How to Run Your UVM Cowbell on...

If you have been living in the US for the last few years (if not, I have a treat for you) and have paid any attention to TV ads, you've probably seen the AT&T Bigger is Better commercials, where an...

View Article


Image may be NSFW.
Clik here to view.

Lazy Test Cases for Tool Failures Using the Testcase Optimizer (TCO)

The Current StateIt seems to be a fact of life that software has bugs and, unfortunately, our software is no exception. In most cases, however, it is not the bug itself that causes you grief. Rather,...

View Article

Image may be NSFW.
Clik here to view.

It’s a Kind of Magic: How Calculated Messages Can Make You a Hero, and There...

At the risk of dating myself—oops, it is too late, I already did so last August while talking about display density innovation—I will use a metaphor from a nineteen eighties movie to illustrate the...

View Article


Image may be NSFW.
Clik here to view.

Searching Through a Complex Design? DFS to the Rescue!

Recently, while at a customer site, I was faced with the huge task of looking for all instances of a specific module to find a particular signal assignment. My first thought was to do a grep search,...

View Article

Image may be NSFW.
Clik here to view.

Dealing with the "Throw it Over the Wall" Methodology in Power Supply Network...

"Throw it over the wall" is business slang for completing your part of a project and then passing it off to the next group. This phrase is usually said when there is little communication between two...

View Article

Image may be NSFW.
Clik here to view.

Small is Beautiful—How UVM Test Case Extraction Can Improve Your Constraint...

In the world formerly known as microelectronics, which is now actually nanoelectronics, small is sure beautiful. With the continued reduction in transistor size, we can afford to pack an insane amount...

View Article
Browsing all 652 articles
Browse latest View live