Expert Insights

Dana Neustadter  |  October 16, 2018

Why AI needs security

As AI becomes pervasive in computing applications, so too does the need for high-grade security in all levels of the system.
Topics: IP - Selection  |  Tags: , ,   |  Organizations:   |  
Allen Watson  |  October 3, 2018

An open-source framework for greater flexibility in machine-learning development

Exchange frameworks are emerging to make it easier for neural-network developers to swap between development environments.
Gordon Cooper  |  September 23, 2018

Flexible embedded vision processing architectures for machine-learning applications

Machine-learning strategies for embedded vision are evolving so quickly that designers need access to flexible, heterogenous processor architectures that can adapt as the algorithms evolve.
Topics: Embedded - Architecture & Design, IP - Selection  |  Tags: , ,   |  Organizations:   |  
Gandharv Bhatara  |  September 11, 2018

EUV’s arrival demands a new resolution enhancement flow

Gandharv Bhatara looks at how the OPC and RET elements of Calibre are getting ready for the EUV age.
Topics: EDA - DFM, - EDA Topics  |  Tags: , , , , , , ,   |  Organizations: , ,   |  
Ashish Darbari  |  August 14, 2018

Doc Formal: Achieving exhaustive formal verification of packet-based designs

Ashish Darbari breaks down formal's value to this challenging verification task with code examples and reference to VC Formal from Synopsys.
Dina Medhat  |  August 13, 2018

Managing waivers in reliability verification

Dina Medhat describes what you need to know about the types of waiver strategy that can be applied.
Ashish Darbari  |  July 23, 2018

The budget case for formal verification

Doc Formal sets out the 10 cost points in verification that formal will help you control and reduce.
Topics: EDA - Verification  |  Tags: , , , ,   |  Organizations:   |  
Sean Safarpour  |  July 17, 2018

Formal fundamentals: what’s hiding behind your constraints

Effective formal verification demands striking a careful balance in the use of constraints – too many slows things down, but too few may let bugs slip through.
Ruud Derwig  |  July 11, 2018

Picking the right-sized crypto processor for your SoC

Choosing the right crypto processor implementation involves a complex set of design tradeoffs between speed, area, power consumption and flexibility. Using consistent benchmarks can help explore your options.
Topics: IP Topics, IP - Selection  |  Tags: , , , ,   |  Organizations: ,   |  
Andy Ladd  |  June 18, 2018

Power analysis isn’t just for battery-operated products

Andy Ladd highlights the wide range of peak-power concerns around plugged-in devices.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Mentor - A Siemens Business
View All Sponsors