000 03559nam a22005415i 4500
001 978-3-030-44282-8
003 DE-He213
005 20220801213923.0
007 cr nn 008mamaa
008 200504s2020 sz | s |||| 0|eng d
020 _a9783030442828
_9978-3-030-44282-8
024 7 _a10.1007/978-3-030-44282-8
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aGoli, Mehran.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_935219
245 1 0 _aAutomated Analysis of Virtual Prototypes at the Electronic System Level
_h[electronic resource] :
_bDesign Understanding and Applications /
_cby Mehran Goli, Rolf Drechsler.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXXI, 166 p. 53 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1. Introduction -- Chapter 2. Background -- Chapter 3. Design Understanding Methodology -- Chapter 4. Application I: Verification -- Chapter 5. Application II: Security Validation -- Chapter 6. Application III: Design Space Exploration -- Chapter 7. Conclusion.
520 _aThis book describes a set of SystemC‐based virtual prototype analysis methodologies, including design understanding, verification, security validation, and design space exploration. Readers will gain an overview of the latest research results in the field of Electronic Design Automation (EDA) at the Electronic System Level (ESL). The methodologies discussed enable readers to tackle easily key tasks and applications in the design process. Provides an extensive introduction to the field of SystemC‐based virtual prototype (VP) analysis at the electronic system level; Describes a design understanding methodology from both debugger-based and compiler‐based perspectives; Illustrates a semi‐formal verification approach to check the validity of a given VP against its specification, user‐defined rules and protocol; Discusses a security validation approach to validate the run‐time behavior of a given VP-based SoC against security threat models, such as information leakage (confidentiality) and unauthorized access to data in a memory (integrity); Describes a design space exploration approach for SystemC-based VPs to guide designers to know under which error limits, different portions of a given VP can be approximated at different granularity levels.
650 0 _aElectronic circuits.
_919581
650 0 _aCooperating objects (Computer systems).
_96195
650 0 _aMicroprocessors.
_935220
650 0 _aComputer architecture.
_93513
650 1 4 _aElectronic Circuits and Systems.
_935221
650 2 4 _aCyber-Physical Systems.
_932475
650 2 4 _aProcessor Architectures.
_935222
700 1 _aDrechsler, Rolf.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_91810
710 2 _aSpringerLink (Online service)
_935223
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030442811
776 0 8 _iPrinted edition:
_z9783030442835
776 0 8 _iPrinted edition:
_z9783030442842
856 4 0 _uhttps://doi.org/10.1007/978-3-030-44282-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75753
_d75753