Author's Latest Posts


Verifying A DDR5 Memory Subsystem


With the increasing complexity of DDR memory models and a vast set of configurations, it has become a daunting experience for verification engineers to verify memory subsystems. With the help of DDR5 Questa VIP and its unique features, engineers can maximize their debugging capabilities and achieve their verification goals quickly and efficiently. This paper introduces the Siemens EDA DDR5 and ... » read more

Machine Learning Application For Early Power Analysis Accuracy Improvement


In this paper, we introduce a machine learning (ML) application that accurately estimates the switching power of the cells without needing the SPEF file (SPEF less PA flow). Three ML models (multi-linear regression, random forest and decision tree) were trained and tested on different industrial designs at 7nm technology. They are trained using different cells’ properties available, SPEF, and... » read more

Software Infrastructure For Silicon Lifecycle Management


Semiconductor technology continues to deliver higher levels of logic density in the era of nanometer processes. System-on-chip (SoC) teams can deliver even higher functionality when coupled with the massive integration possibilities of three-dimensional integrated circuit (3DIC) architectures. However, this growth must be matched by increases in capabilities and productivity in the collection a... » read more

Responding To The Rapid Advancement Of Cockpit Domain Controllers


Every aspect of a modern vehicle’s performance is controlled by a complex network of hardware and software. Nowhere is this more apparent than the interface between the driver and the machine, in what is known as the cockpit domain. In order to succeed in this domain of fast-paced advancement, today’s OEM needs to understand the trends in this arena, the current challenges and solutions, an... » read more

Enhance IC Reliability Design Verification With Coordinate-Based P2P And CD Checking


Coordinate-based P2P and CD checks with the Calibre PERC reliability platform enable quick early-stage design verification of ESD protection and other IC reliability issues. Using coordinate-based checking minimizes the amount of rule deck coding required, enabling design teams to start Calibre PERC P2P/CD verification very quickly, and understand and debug the results easily. Because P2P/CD ch... » read more

Understanding Automotive Reliability And ISO 26262 for Safety-Critical Systems


Automotive electronics are playing a rapidly expanding role in automotive platforms tied to safety systems. Not content with the more traditional electronic systems such as airbag controllers, anti-lock braking systems, engine control units, and the like, integrated circuit (IC) manufacturers have been expanding into advanced driver assistance systems (ADAS) and other automotive electroni... » read more

High-Level Synthesis: It’s Still Hardware Design


Hardware design using HLS is no different than the typical ASIC/FPGA design flow with the exception that C++/SystemC is being used along with HLS to create the RTL instead of hand coding it. The advantage of using HLS is that it speeds up RTL creation time and reduces verification time by producing bug free RTL quickly from a fully verified C++/SystemC source. The misconception that still exist... » read more

NVMe-oF: Simple, Invisible Fabric For Distributed Storage Networks


In today’s fast paced world, we need seamless access to huge chunks of data and new-world technologies, such as artificial intelligence (AI), machine learning (ML), cloud computing, and real-time data analytics. AI researchers are deriving applications such as cyber security analysis and intelligent virtual assistants (IVA) where the computer needs to process an intense amount of data. Theref... » read more

Automotive Safety Island


The promise of autonomous vehicles is driving profound changes in the design and testing of automotive semiconductor parts. Automotive ICs, once deployed for simple functions like controlling windows, are now performing complex functions related to advanced driver-assist systems (ADAS) and autonomous driving applications. The processing power required results in very large and complex ICs that ... » read more

Cybersecurity: The Case For Hardware-Based Threat Detection And Mitigation


The requirements of cyberphysical systems place great responsibility on design teams. Their mission-critical roles in controlling mechanical systems, from aircraft though motor vehicles to industrial plants, have always called for safety-focused design. As these systems have become connected to the internet, safety has become intertwined with security. One mechanism for detecting suspicious ... » read more

← Older posts Newer posts →