As I noted at the beginning of this series, the term “logic equivalence checking” (LEC) applies to a number of…
No one ever said that functional verification was easy. In fact, from a computer science theoretical perspective verification is considered…
While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to…
In Part 1 of this series, inspired by security researchers that were able take over a new Jeep and drive…
[Preface: everywhere it refers to automobiles in this post, you can also swap in “X-Ray machine”, “pacemaker”, and “aircraft”] The…
Do you have a really tough verification problem – one that takes seemingly forever for a testbench simulation to solve…