Skip to content
Synopsys, September 21, 2023

Efficient Bluespec RISC-V Processor Verification for Highest Coverage Closure: A Comprehensive Case Study

The ability to mix and match multiple ISA extensions and add user-defined ISA extensions makes RISC-V verification more challenging than conventional processor verification. This Synopsys webinar demonstrates the verification of standard RISC-V ISA extensions. A… Efficient Bluespec RISC-V Processor Verification for Highest Coverage Closure: A Comprehensive Case Study

Synopsys, June 14, 2023

Verify Your SoC Design Efficiently from Planning to Coverage Closure using Synopsys Verification Family

Verifying an SoC is an extremely complex process that requires agile turnaround, constant control feedback, and flexibility to adapt to evolving project needs. Coverage is an efficient metric for the number of potential bugs found… Verify Your SoC Design Efficiently from Planning to Coverage Closure using Synopsys Verification Family

Doulos, February 4, 2022

Everything You Need to Know about SystemVerilog Arrays

This webinar gives a comprehensive guide to all aspects of SystemVerilog arrays: ordinary static arrays, dynamic arrays, queues and associative arrays. It also includes array methods and practical examples. Topics: Review of Verilog array types… Everything You Need to Know about SystemVerilog Arrays

Avoiding SoC Security Threats – What Verification Engineers Should Know

Avoiding SoC Security Threats – What Verification Engineers Should Know

Thursday, September 30, 2021 | 11:00 -11:30 a.m. PDT The development of secure systems is of paramount importance in this age of software intensive electronic systems. Security weaknesses in the SoC hardware can lead to… Avoiding SoC Security Threats – What Verification Engineers Should Know