tag 标签: random

相关博文
  • 热度 16
    2013-7-18 18:36
    3365 次阅读|
    0 个评论
    Mentor's Harry Foster continues to release instalments of the Wilson Research study results, and in this installment , Foster talks about some of the system-level aspects of chips, such as the number of clock domains—which have basically stayed level over the past 10 years—and the verification of power management and other power-related aspects of a design. This topic is interesting because it is the first time that a piece of functionality has truly existed at the system level that cannot be fully verified at the block level. Sixty-seven per cent of designs now contain power management, although many of these still use very basic mechanisms, such as clock gating. But I'm not talking about basic mechanisms here. These mechanisms can be verified at the block level and present no management capabilities up to the system level. Let me give you the surprising numbers first, followed by my interpretation of them. Over 30 per cent of the companies in the survey that actively manage power spend less than 10 per cent of their time doing power-aware simulation, and almost 80 per cent of those prefer to use directed testing to accomplish it. First, I am not surprised that the total verification time spent on power management is low. Let's face it, power management is only a small part of the functionality of the chip; if it were a large percentage of the chip's functionality, it would indicate a very serious problem. I'm actually surprised at how many companies do report spending significant amounts of time on verifying power management. For example, about 7 per cent of the companies say they spend 30 per cent to 39 per cent of their time on this one problem and many report spending even more. I have to believe that these companies did not understand the question or were answering as to their individual engineer responsibility. If a large number of power-verification people were responding to the survey, it could skew the results; but I do wonder about the 30 per cent of respondents who claim to be spending 20 per cent or more of their time on this one task. If we look at how respondents are accomplishing this verification, we see that almost 80 per cent of them are using directed test methods. Thirty per cent report using constrained random, and I have to believe that most of these are concentrating on the power functionality at the block level. Constrained random has a lot of difficulty dealing with system-level functionality and as far as I know, there are no constrained random generators that take power intent into account. As Harry's blog states, "Since the power intent cannot be directly described in an RTL model, alternative supporting notations have recently emerged to capture the power intent." To attempt to verify power intent using constrained random would be a very inefficient methodology and so directed testing is one of the few methods available to them. Today, this could be stated more broadly by saying that any system-level verification is likely to use directed tests because processors are involved and constrained random does not handle processors well. We are beginning to see solutions emerge that can systematically create verification code that will run on the processors, and that means that while system-level constrained random will be with us in the future, it will look very different from the constrained random of today. How much time are you spending on power-management verification and what methods do you use? Brian Bailey EE Times  
相关资源
  • 所需E币: 1
    时间: 2022-8-4 10:21
    大小: 37.24MB
    Non-UniformRandomVariateGeneration
  • 所需E币: 1
    时间: 2022-7-23 18:16
    大小: 22.66KB
    上传者: Argent
    RandomNumberGenerator
  • 所需E币: 1
    时间: 2022-5-2 15:05
    大小: 3.18MB
    RandomnumbergenerationandMonteCarlomethods
  • 所需E币: 1
    时间: 2022-4-14 09:32
    大小: 7.24MB
    DetectionofRandomSignalsinDependentGaussianNoise
  • 所需E币: 0
    时间: 2022-3-15 02:32
    大小: 20.81MB
    上传者: samewell
    RRAMResistiveRandomAccessMemory相关技术手册.pdf
  • 所需E币: 4
    时间: 2019-12-28 23:57
    大小: 48KB
    上传者: wsu_w_hotmail.com
    Thisapplicationnotedescribeshowtousethelowest4bitsoftheDS2790'stemperatureregistertogeneratea16-bitrandomvalue.ThisnotealsoprovidesexampleCcodeforgeneratinga16-bitrandomvalue.……
  • 所需E币: 3
    时间: 2019-12-24 23:05
    大小: 41.9KB
    上传者: 978461154_qq
    Abstract:SeveralapplicationsusetheMaximSHAiButton®tokensforeCash,vending,farecollection,anduserauthentication.Theyrequiretheuseofsecretstorecognizeauthentictokensandtosecuredataandmonetaryvaluesagainsttampering.Thesecurityofanentirecryptographicsystemrestswithitsabilitytoproperlygenerateandprotectitssecretsandchallenges.Thisapplicationnotedescribesmethodstogenerateworld-classcryptographicsecretsandchallenges.Italsodescribesthedevicesthatcanholdthosevalueswheretheyaresafefromattack,anddescribesschemeswheresecretsneverleavetheprotectedsiliconenvironmentatanytimeandareneversubjecttocompromise.Maxim>AppNotes>1-WireDevicesiButtonSecurityandAuthenticationKeywords:SHAiButton,SHA-1,secret,MAC,challenge,authentication,ecash,entropy,randomnumbers,cryptography,digitalsignatureMar08,2002APPLICATIONNOTE152SHAiButtonSecretsandChallengesAbstract:SeveralapplicationsusetheMaximSHAiButtontokensforeCash,vending,farecollection,anduserauthentication.Theyrequiretheuseofsecretstorecognizeauthentictokensandtosecuredataandmonetaryvaluesagainsttampering.Thesecurityofanentirecryptographicsystemrestswithitsabilitytoproperlygenerateandprotectitssecretsandchallenges.Thisapplicationnotedescribesmethodstogenerateworld-classcryptographicsecretsandchallenges.Italsodescribesthedevicesthatcan……
  • 所需E币: 4
    时间: 2019-12-24 23:05
    大小: 45.88KB
    上传者: wsu_w_hotmail.com
    Abstract:ThisdocumentshowshowMaxim'sDS1963SSHAiButton®canbeusedwithsmallmicrocontrollerstoprovidestrongencryptionandauthenticationofcontrolandstatusmessages,telemetry,orsensitiveprocesscontrolinformation.Forlowcostandlowoverhead,itprovidesnonvolatilememory,securesecretstorage,secretsharingandrotation,fastSHA-1padgeneration,andagloballyuniqueserialnumber.Asimplemicrocontrollerneedsonlyprovideasingleportpinandafewdozenlinesofcodetoattainqualitycryptographicsecurity.Maxim>AppNotes>1-WireDevicesiButtonSecurityandAuthenticationKeywords:cryptography,encryption,SHA,SHA-1,microcontroller,smallmessage,MAC,hash,one-way,authentication,security,randomFeb04,2002number,randomnumbers,pad,secret,coprocessor,rotation,DS1963S,DS1961S,DS2432APPLICATIONNOTE150SmallMessageEncryptionusingSHADevicesAbstract:ThisdocumentshowshowMaxim'sDS1963SSHAiButtoncanbeusedwithsmallmicrocontrollerstoprovidestrongencryptionandauthenticationofcontrolandstatusmessages,telemetry,orsensitiveprocesscontrolinformation.Forlowcostandlowoverhead,itprovidesnonvolatilememory,securesecretstorage,secretsharingandrotation,fastSHA-1padgeneration,andagloballyuniqueserialnumber.Asimplemic……
  • 所需E币: 5
    时间: 2019-12-24 23:05
    大小: 84.61KB
    上传者: givh79_163.com
    Abstract:Challenge-responsecanbeasecurewayofprotectingaccesstoanyprivilegedmaterialifimplementedcorrectly.Inthisdocument,manyoptionsforchallenge-responseaccesscontrolarediscussedbutthemostsecuremethodgivenispresentingadifferentrandomchallengeoneachaccessattemptandhavingaresponsethatonlythehostcaninterpretwithoutgivingoutanysecrets.ThisdocumentshowswhyMaxim’sSHA-1iButtons®and1-Wiredevicesareidealchoiceswhenimplementingthiskindofchallenge-responsesystem.Maxim>AppNotes>1-WireDevicesiButtonSecurityandAuthenticationKeywords:challenge-response,challenge,randomchallenge,response,SHA,SHA-1,MAC,coprocessor,user,accesscontrol,Mar12,2002authentication,ecash,webaccess,randomnumbergenerator,DS1963S,DS1961S,DS2432,softwarepiracyAPPLICATIONNOTE190ChallengeandResponsewith1-WireSHADevicesAbstract:Challenge-responsecanbeasecurewayofprotectingaccesstoanyprivilegedmaterialifimplementedcorrectly.Inthisdocument,manyoptionsforchallenge-responseaccesscontrolarediscussedbutthemostsecuremethodgivenispresentingadifferentrandomchallengeoneachaccessattemptandhavingaresponsethatonlythehostcaninterpretwithoutgivingoutanysecrets.ThisdocumentshowswhyM……
  • 所需E币: 4
    时间: 2019-12-24 22:31
    大小: 35.2KB
    上传者: rdg1993
    Abstract:Part3oftheEffectsofDigitalCrosstalkinDataConverters.Thisarticlesgoesintoananalysisofnoiseontheoutputdatalinecouplingontotheclocksourceofthedataconverter.Maxim>AppNotes>A/DandD/ACONVERSION/SAMPLINGCIRCUITSKeywords:noise,powersupplycoupling,capacitivecrosstalk,groundingcurrents,digitalcrosstalk,FFT,Dec27,2002randomnoise,harmonicdistortion,ADC,DAC,clock,jitter,analogtodigitalconverter,convertersAPPLICATIONNOTE1841EffectsofDigitalCrosstalkinDataConvertersPart2:CrosstalkontheClockAbstract:Part2ofaseriesofarticlesexplainingtheeffectsofdigitalcrosstalkindataconverters.Thisarticletalksaboutnoiseontheclocksource(jitter)andtheeffectsontheanalog-to-digitalconverter(ADC).ThisisPart2ofa3-partseries:qPart1:EffectsofDigitalCrosstalkinDataConvertersqPart3:DigitalDataSignalCrosstalkontheClockWhatistheeffectofcro……
  • 所需E币: 5
    时间: 2019-12-24 22:29
    大小: 35.2KB
    上传者: 二不过三
    Abstract:Thisarticleprovidesanunderstandingoftheeffectsofdigitalcrosstalkcouplingontoanalogsignallines.Typicalmechanismsofdigitalcrosstalkincludepowersupplycoupling,capacitivecrosstalk,andgroundingcurrents.Maxim>AppNotes>A/DandD/ACONVERSION/SAMPLINGCIRCUITSKeywords:noise,powersupplycoupling,capacitivecrosstalk,groundingcurrents,digitalcrosstalk,FFT,Dec27,2002randomnoise,harmonicdistortion,ADC,DAC,clock,jitter,analogtodigitalconverter,convertersAPPLICATIONNOTE1841EffectsofDigitalCrosstalkinDataConvertersPart2:CrosstalkontheClockAbstract:Part2ofaseriesofarticlesexplainingtheeffectsofdigitalcrosstalkindataconverters.Thisarticletalksaboutnoiseontheclocksource(jitter)andtheeffectsontheanalog-to-digitalconverter(ADC).ThisisPart2ofa3-partseries:qPart1:EffectsofDigitalCrosstalkinDataConvertersqPart3:DigitalDataSignalCrosstalkontheClockWhatistheeffectofcro……
  • 所需E币: 3
    时间: 2019-12-24 22:22
    大小: 66.29KB
    上传者: wsu_w_hotmail.com
    Abstract:Part2ofaseriesofarticlesexplainingtheeffectsofdigitalcrosstalkindataconverters.Thisarticletalksaboutnoiseontheclocksource(jitter)andtheeffectsontheanalog-to-digitalconverter(ADC).Maxim/Dallas>AppNotes>A/DandD/ACONVERSION/SAMPLINGCIRCUITSKeywords:noise,powersupplycoupling,capacitivecrosstalk,groundingcurrents,digitalcrosstalk,FFT,Dec27,2002randomnoise,harmonicdistortion,analogtodigitalconverters,ADC,DAC,clock,jitter,dataconverterAPPLICATIONNOTE1842EffectsofDigitalCrosstalkinDataConvertersPart3:DigitalDataSignalCrosstalkontheClockPart3oftheEffectsofDigitalCrosstalkinDataConverters.Thisarticlesgoesintoananalysisofnoiseontheoutputdatalinecouplingontotheclocksourceofthedataconverter.ThisisPart3ofa3-partseries:qPart1:EffectsofDigitalCrosstalkinDataConvertersqPart2:CrosstalkontheClockCrosstalkfromdigitaldatasignalsintotheclock……
  • 所需E币: 3
    时间: 2019-12-24 17:08
    大小: 57.15KB
    上传者: quw431979_163.com
    摘要:介绍了线性反馈移位寄存器与多项式完全形容他们。本应用笔记介绍了他们如何可以实现和技术可以用来改善所产生的数字统计特性。Maxim>AppNotes>GeneralEngineeringTopicsMicrocontrollersKeywords:microcontrollermicroprocessorLFSRrandomJun30,2010APPLICATIONNOTE4400PseudoRandomNumberGenerationUsingLinearFeedbackShiftRegistersBy:ConradSchlundtAbstract:Linearfeedbackshiftregistersareintroducedalongwiththepolynomialsthatcompletelydescribethem.Theapplicationnotedescribeshowtheycanbeimplementedandtechniquesthatcanbeusedtoimprovethestatisticalpropertiesofthenumbersgenerated.IntroductionLFSRs(linearfeedbackshiftregisters)provideasimplemeansforgeneratingnonsequentiallistsofnumbersquicklyonmicrocontrollers.Generatingthepseudo-randomnumbersonlyrequiresaright-……
  • 所需E币: 4
    时间: 2020-1-16 12:22
    大小: 1.62MB
    上传者: 238112554_qq
    RandomMatrixTheoryandWirelessCommunicationsRandomMatrixTheoryandWirelessCommunicationsAntoniaM.TulinoDept.IngegneriaElettronicaedelleTelecomunicazioniUniversitadegliStudidiNapoli”FedericoII”Naples80125,Italyatulino@ee.princeton.eduSergioVerduDept.ElectricalEngineeringPrincetonUniversityPrinceton,NewJersey08544,USAverdu@princeton.eduFoundationsandTrendsTMinCommunicationsandInformationTheoryPublished,soldanddistributedby:POBox1792600ADDelftTheNetherlandsTel:+31-6-51115274www.nowpublishers.comsales@nowpublishers.cominNorthAmerica:nowPublishersInc.POBox1024Hanover,MA02339USATel.+1-781-985-4510Printedonacid-freepaperISSNs:Paperversion1567-2190;Electronicversion1567-2328c2004A.M.TulinoandS.VerduAllrightsreserved.Nopartofthispu……
  • 所需E币: 4
    时间: 2019-12-29 00:03
    大小: 49KB
    上传者: 微风DS
    ThisapplicationnotepresentsanoverviewoftheDS32X35familyofproducts.ThesedevicesprovideanaccurateReal-TimeClockwithFerroelectricRandomAccessMemory(RTC+FRAM)thatdoesnotrequireabatterytomaintainitscontents.……
  • 所需E币: 3
    时间: 2019-12-24 17:06
    大小: 44.22KB
    上传者: 978461154_qq
    摘要:这种抖动引进各种抖动类型,包括随机抖动类型的定义:高斯,毗邻循环周期-周期抖动和确定性抖动类型:占空比失真,脉冲宽度失真,脉冲偏移和数据依赖(模式)抖动。本应用笔记还讨论了各种抖动元件和系统的误码率(BER)之间的关系。Maxim>AppNotes>HIGH-SPEEDINTERCONNECTKeywords:jitter,gaussian,random,RJ,deterministic,cycletocycle,adjacentcycle,dutycycledistortion,Mar06,2003pulsewidthdistortion,inter-symbol,biterrorrate,BER,berAPPLICATIONNOTE1916AnIntroductiontoJitterinCommunicationsSystemsAbstract:Thisintroductiontojitterpresentsdefinitionsforvariousjittertypesincludingtherandomjittertypes:Gaussian,cycle-to-cycle,adjacentcycle;anddeterministicjittertypes:dutycycledistortion,pulsewidthdistortion,pulseskewanddatadependent(pattern)jitter.TheapplicationnotealsodiscussestherelationshipbetweenthevariousjittercomponentsandsystemBitErrorRate(BER).WhatisJitter?TheSONETstandardstatesthat"Jitterisdefinedasthesho……