Recommended Articles

Recommended Articles – April 2015

Reading a specification is a continuous process that anyone can learn. Stefan guides you through the steps of this process: AMIQ Blog: How to Read a Specification: You can draw a picture without lifting the pencil by using constraint random generation: VerificationGentleman: Fun and Games with CRV: Draw This Without Lifting Your Pencil Writing assertions […]

Recommended Articles

Recommended Articles – March 2015

The Spring is here! We offer you a nice, hand-picked, bouquet of articles. Sean Eron Anderson saves us from the marsh of bitwise operations. He compiled a list of techniques, algorithms, operations, functions that one could do to pull oneself up: Standford: Bit Twiddling Hacks The Gentleman presents his view on the good, ol’ topic […]

Recommended Articles

Recommended Articles – February 2015

Although February was a 28 days month the Verification community was more active than on a 31 days month. The random generation strategy could be the root cause of long time required to achieve coverage closure. Claudia provides a use case scenario for evaluating coverage closure in relation to generation strategy: AMIQ Blog: A Coverage […]

Recommended Articles

Recommended Articles – January 2015

High speed serial protocols transmit or receive data on a 2xN-wire bus that usually does not include the clock signal. Each device must recover the clock out of the incoming data traffic. Deepak Nagaria explains how clock recovery works: ArrowDevices: Beginners Guide To Clock Data Recovery There are RTL designs which make use of two […]

Recommended Articles

Recommended Articles – December 2014

I wish our readers a 2015 filled up with personal and professional accomplishments! Daniel Bayer from Cadence, brings the first article in a series that highlights constraint-modelling in Specman: Cadence: Connected Field Sets – What Are Those and Why Should I Care? Trent McClements from Invionics shows why combining macro definitions inside a package can […]

Recommended Articles

Recommended Articles – November 2014

Tudor recommends us to take advantage of the e-language features to define similar vr_ad registers instead of using copy/paste: VerificationGentleman: Experimental Cures for Flattened Register Definitions in vr_ad Then he shows us how to implement side effects of read/write operations using vr_ad’s indirect_access() method: VerificationGentleman: Using indirect_access(…) in vr_ad The same Gentleman tutors us on […]