As AI becomes pervasive in computing applications, so too does the need for high-grade security in all levels of the system.
Exchange frameworks are emerging to make it easier for neural-network developers to swap between development environments.
Machine-learning strategies for embedded vision are evolving so quickly that designers need access to flexible, heterogenous processor architectures that can adapt as the algorithms evolve.
Gandharv Bhatara looks at how the OPC and RET elements of Calibre are getting ready for the EUV age.
Ashish Darbari breaks down formal's value to this challenging verification task with code examples and reference to VC Formal from Synopsys.
Dina Medhat describes what you need to know about the types of waiver strategy that can be applied.
Doc Formal sets out the 10 cost points in verification that formal will help you control and reduce.
Effective formal verification demands striking a careful balance in the use of constraints – too many slows things down, but too few may let bugs slip through.
Choosing the right crypto processor implementation involves a complex set of design tradeoffs between speed, area, power consumption and flexibility. Using consistent benchmarks can help explore your options.
Andy Ladd highlights the wide range of peak-power concerns around plugged-in devices.
View All Sponsors