The verification of digital intellectual property (IP) blocks has always been a challenge. Simple IP blocks with straightforward test inputs, can be quite thoroughly verified with software simulators such as Modelsim. But the verification of a complex System-on-Chip (SoC) on a software simulator can last days or even weeks, and that assumes that every IP on the SoC has a working simulation model. Although modern programmable chips can be monitored in real time with tools like Altera’s Signaltap II, they still only offer monitoring capabilities for a limited amount of signals and for a limited amount of time. To overcome this deficiency, IP information registers (IIR) were developed for this thesis. These registers are used to store informa...
Intellectual property (IP) block reuse is essential for facilitating the design process of system-on...
VLSI technology brought revolution in EDA industry. Fabrication of complicated system on a chip is p...
Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at var...
The verification of digital intellectual property (IP) blocks has always been a challenge. Simple IP...
This book describes the life cycle process of IP cores, from specification to production, including ...
We introduce the first approach that can actively control multiple hardware intellectual property (I...
We introduce the first approach that can actively control multiple hardware intellectual property (I...
Leading-edge systems-on-chip (SoC) being designed today could reach 20 Million gates and 0.5 to 1 GH...
Intellectual property (IP) cores are essential to creating modern system-on-chips (SoCs). Protecting...
With the advancement of semiconductor processing technology, the capacity and versatility of an inte...
International audienceIntellectual Property (IP) illegal copying is a major threat in today's integr...
Advances in technology scaling and miniaturization of on-chip structures have caused an increasing c...
[[abstract]]We propose an Internet-based concurrent-simulation scheme to ease intellectual property ...
The objective of this thesis is to introduce a new method for identifying and detecting Intellectual...
International audience—Intellectual Property (IP) illegal copying is a major threat in today's integ...
Intellectual property (IP) block reuse is essential for facilitating the design process of system-on...
VLSI technology brought revolution in EDA industry. Fabrication of complicated system on a chip is p...
Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at var...
The verification of digital intellectual property (IP) blocks has always been a challenge. Simple IP...
This book describes the life cycle process of IP cores, from specification to production, including ...
We introduce the first approach that can actively control multiple hardware intellectual property (I...
We introduce the first approach that can actively control multiple hardware intellectual property (I...
Leading-edge systems-on-chip (SoC) being designed today could reach 20 Million gates and 0.5 to 1 GH...
Intellectual property (IP) cores are essential to creating modern system-on-chips (SoCs). Protecting...
With the advancement of semiconductor processing technology, the capacity and versatility of an inte...
International audienceIntellectual Property (IP) illegal copying is a major threat in today's integr...
Advances in technology scaling and miniaturization of on-chip structures have caused an increasing c...
[[abstract]]We propose an Internet-based concurrent-simulation scheme to ease intellectual property ...
The objective of this thesis is to introduce a new method for identifying and detecting Intellectual...
International audience—Intellectual Property (IP) illegal copying is a major threat in today's integ...
Intellectual property (IP) block reuse is essential for facilitating the design process of system-on...
VLSI technology brought revolution in EDA industry. Fabrication of complicated system on a chip is p...
Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at var...