{"id":12584,"date":"2016-11-21T14:43:48","date_gmt":"2016-11-21T21:43:48","guid":{"rendered":"https:\/\/blogs.mentor.com\/verificationhorizons\/?p=12584"},"modified":"2026-03-27T08:37:57","modified_gmt":"2026-03-27T12:37:57","slug":"part-11-the-2016-wilson-research-group-functional-verification-study","status":"publish","type":"post","link":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2016\/11\/21\/part-11-the-2016-wilson-research-group-functional-verification-study\/","title":{"rendered":"Part 11: The 2016 Wilson Research Group Functional Verification Study"},"content":{"rendered":"<h2><strong>ASIC\/IC Power Trends<\/strong><\/h2>\n<p>This blog is a continuation of a series of blogs related to the 2016 Wilson Research Group Functional Verification Study (<a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/08\/08\/prologue-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">click here<\/a>).\u00a0\u00a0In my previous blog (<a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/10\/31\/part-10-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">click here<\/a>), I presented our study findings on various verification language and library adoption trends. In this blog, I focus on power trends.<\/p>\n<p>Today, we see that about 72 percent of design projects actively manage power with a wide variety of techniques, ranging from simple clock-gating, to complex hypervisor\/OS-controlled power management schemes (see Figure 1). This is essentially unchanged from our 2014 study.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-12585\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2016\/11\/BLOG-2016-WRG-figure-11-1-520x293.png\" alt=\"BLOG-2016-WRG-figure-11-1\" width=\"520\" height=\"293\" \/><\/p>\n<p><strong>Figure 1. ASIC\/IC projects working on designs that actively manage power<\/strong><\/p>\n<p>Figure 2 shows the various aspects of power-management that design projects\u00a0must verify (for those 72 percent of design projects that actively manage power). The data from our study suggest that many projects are moving to more complex power-management schemes that involve software control. This adds a new layer of complexity to a project\u2019s verification challenge, since these more complex power management schedules often require emulation to fully verify.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-12586\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2016\/11\/BLOG-2016-WRG-figure-11-2-520x293.png\" alt=\"BLOG-2016-WRG-figure-11-2\" width=\"520\" height=\"293\" \/><\/p>\n<p><strong>Figure 2. Aspects of power-managed design that are verified<\/strong><\/p>\n<p>Since the power intent cannot be directly described in an RTL model, alternative supporting notations have recently emerged to capture the power intent. In the 2016 study, we wanted to get a sense of where the industry stands in adopting these various notations and what we found was essentially no change from our 2014 study. For projects that actively manage power, Figure 3 shows the various standards\u00a0used to describe power intent that have been adopted. Some projects are actively using multiple standards (such as different versions of UPF or a combination of CPF and UPF). That\u2019s why the adoption results do not sum to 100 percent.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-12587\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2016\/11\/BLOG-2016-WRG-figure-11-3-520x293.png\" alt=\"BLOG-2016-WRG-figure-11-3\" width=\"520\" height=\"293\" \/><\/p>\n<p><strong>Figure 3. Notation used to describe power intent<\/strong><\/p>\n<p>In an earlier blog in this series, I provided data that suggest a significant amount of effort is being applied to ASIC\/IC functional verification. An important question the various studies have tried to answer is whether this increasing effort is paying off. In my next blog (<a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/12\/02\/part-12-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">click here<\/a>), I present verification results findings in terms of schedules, number of required spins, and classification of functional bugs.<\/p>\n<p><strong>Quick links to the 2016 Wilson Research Group Study results<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/08\/08\/prologue-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Prologue: The 2016 Wilson Research Group Functional Verification Study<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/08\/08\/understanding-and-minimizing-study-bias-2016-study\/\" target=\"_blank\" rel=\"noopener\">Understanding and Minimizing Study Bias (2016 Study)<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/08\/15\/part-1-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 1 \u2013 FPGA Design Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/08\/22\/part-2-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 2\u00a0\u2013 FPGA Verification Effort Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/08\/29\/part-3-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part\u00a03\u00a0\u2013 FPGA Verification Effort Trends (Continued)<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/09\/07\/part-4-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 4 \u2013\u00a0FPGA Verification Effectiveness Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/09\/11\/part-5-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 5 \u2013\u00a0FPGA Verification Technology Adoption Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/09\/21\/part-6-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 6 \u2013\u00a0FPGA Verification Language and Library Adoption Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/09\/25\/part-7-the-2016-wilson-research-group-functional-verification-stud\/\" target=\"_blank\" rel=\"noopener\">Part\u00a07 \u2013\u00a0ASIC\/IC Design Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/10\/04\/part-8-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 8\u00a0\u2013\u00a0ASIC\/IC Resource Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/10\/10\/part-9-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 9 \u2013\u00a0ASIC\/IC Verification Technology Adoption Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/10\/31\/part-10-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 10 \u2013\u00a0ASIC\/IC Language and Library Adoption Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/11\/21\/part-11-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 11\u00a0\u2013\u00a0ASIC\/IC Power Management Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2016\/12\/02\/part-12-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Part 12\u00a0\u2013\u00a0ASIC\/IC Verification Results Trends<\/a><\/li>\n<li><a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2017\/01\/03\/conclusion-the-2016-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noopener\">Conclusion: The 2016 Wilson Research Group Functional Verification Study<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ASIC\/IC Power Trends This blog is a continuation of a series of blogs related to the 2016 Wilson Research Group&#8230;<\/p>\n","protected":false},"author":71592,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spanish_translation":"","french_translation":"","german_translation":"","italian_translation":"","polish_translation":"","japanese_translation":"","chinese_translation":"","footnotes":""},"categories":[1],"tags":[309,506,528,535,577,785,819],"industry":[],"product":[],"coauthors":[],"class_list":["post-12584","post","type-post","status-publish","format-standard","hentry","category-news","tag-309","tag-functional-verification","tag-ieee","tag-ieee-1801","tag-low-power","tag-upf","tag-verification"],"_links":{"self":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/12584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/users\/71592"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/comments?post=12584"}],"version-history":[{"count":1,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/12584\/revisions"}],"predecessor-version":[{"id":19836,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/12584\/revisions\/19836"}],"wp:attachment":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/media?parent=12584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/categories?post=12584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/tags?post=12584"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/industry?post=12584"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/product?post=12584"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/coauthors?post=12584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}