High-performance vision-processing algorithms need optimized CNN engines to deliver the right performance within the power budget of embedded applications.
Why is formal verification not getting the traction it should. The good doctor has some thoughts on that... and a new solution.
If we thought about verfication-for-security in a different way, the Spectre and Meltdown vulnerabilities could well have been avoided.
How to get the best PV results by reducing computational demands; handling data more efficiently and exploiting parallelization.
Achieving ISO 26262 certification for advanced driver assistance systems takes a combination of ASIL ready IP and rigorous development strategies.
Introducing one of the latest refinements of formal and showing how ArterisIP and Oski Technology used the strategy on an ARM-based design.
Ashish Darbari concludes his series on the need for new verification strategies by considering Debug and Signoff & Review.
Richard Pugh shows how the fast-growing market for drone silicon highlights emulation's power where high data volumes are critical.
In part two of this series, Ashish Darbari introduces a checklist to address verification challenges and build the meta model.
John Ferguson reviews the key capital metrics you need to review when deciding whether to move to a new process.
View All Sponsors