Expert Insights

Saunder Peng  |  March 9, 2018

A better way to merge design files for physical verification

Still using custom layout or place and route tools here? Ditch that time-consuming practice for a real database merge flow.
Gordon Cooper  |  February 27, 2018

Optimizing power and performance trade-offs in CNN implementations for embedded vision

High-performance vision-processing algorithms need optimized CNN engines to deliver the right performance within the power budget of embedded applications.
Ashish Darbari  |  February 23, 2018

Doc Formal: Living verification in the fast lane

Why is formal verification not getting the traction it should. The good doctor has some thoughts on that... and a new solution.
Luke Collins  |  February 14, 2018

Bringing AI into our lives

Using specialised processors to implement key AI computation tasks such as CNNs.
Topics: Embedded - Architecture & Design, IP - Selection  |  Tags: , ,   |  Organizations:   |  
Ashish Darbari  |  January 26, 2018

Doc Formal: When ‘silicon proven’ is not enough

If we thought about verfication-for-security in a different way, the Spectre and Meltdown vulnerabilities could well have been avoided.
Topics: EDA - Verification  |  Tags: , , , , , ,   |  Organizations:   |  
Ashish Darbari  |  December 5, 2017

Doc Formal: the crisis of confidence facing verification III

Ashish Darbari concludes his series on the need for new verification strategies by considering Debug and Signoff & Review.
Richard Pugh  |  December 4, 2017

Data-hungry applications demand emulation

Richard Pugh shows how the fast-growing market for drone silicon highlights emulation's power where high data volumes are critical.
Topics: EDA - Verification  |  Tags: , , , , , , ,   |  Organizations:   |  
Ashish Darbari  |  November 29, 2017

Doc Formal: The crisis of confidence facing verification II

In part two of this series, Ashish Darbari introduces a checklist to address verification challenges and build the meta model.
John Ferguson  |  November 24, 2017

Assessing the true cost of node transitions

John Ferguson reviews the key capital metrics you need to review when deciding whether to move to a new process.
Rich Collins  |  November 6, 2017

Fighting the war of escalation in embedded systems security

The challenge for designers is to find ways of providing high levels of security in low-cost devices that have become worthwhile targets because of their role as gateways to more valuable information.
Topics: Embedded - Architecture & Design, IP - Selection  |  Tags: , ,   |  Organizations:   |  

PLATINUM SPONSORS

Synopsys Cadence Design Systems Mentor - A Siemens Business
View All Sponsors