Browse Definitions :
Definition

intelligent verification

Intelligent verification is a software process that allows engineers and technicians to use computers to ensure that a hardware design will perform as expected once the device has been fabricated or built. The term applies especially to the design and manufacture of integrated circuits (ICs), also called chips.

Until about the year 2000, engineers and technicians could verify the functionality of an IC design by testing all possible scenarios individually, a process called manual verification. As ICs grew more complex, manual verification became unworkable because the vast number of possible conditions, called coverage points, grew too large. The impracticality of manual verification gave rise to the notion of intelligent verification.

Programs for intelligent verification remain in the conceptual and early development phases. The ideal intelligent-verification software will classify events within a subject IC according to relative importance, automatically tackling the most serious problems first. The debugging process will not rely on trial-and-error or "brute-force" methods but instead will strategically identify, track down, and resolve existing design flaws. Time and resources will be saved by minimizing or eliminating tests for previously resolved flaws.

 

Continue reading about intelligent verification:

Design & Reuse discusses intelligent verification methods.

Chip Design speculates about the future of intelligent verification.

This was last updated in March 2012

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close