期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
如何在先进工艺节点利用Virtuoso Check/Assertion Flow
1
作者 王超 刘欢艳 《电子技术应用》 北大核心 2016年第8期28-32,共5页
Virtuoso和MMSIM有效结合,完整的Check/Assertion flow包含:在图形界面设置Check/Assert,通过仿真得到Check/Assert的结果,在图形界面直接显示Check/Assert的结果,对结果进行各种灵活的后处理,并在schematic直接进行反标。该流程可以覆... Virtuoso和MMSIM有效结合,完整的Check/Assertion flow包含:在图形界面设置Check/Assert,通过仿真得到Check/Assert的结果,在图形界面直接显示Check/Assert的结果,对结果进行各种灵活的后处理,并在schematic直接进行反标。该流程可以覆盖电路设计常用check需求,完全不依赖脚本,图形界面让工程师更容易上手,基于瞬态仿真的Dynamic Check相比其他工具更具优势。有效利用Check/Assert flow,可以帮助避免或及早发现设计中的一些常见问题,从而减少设计迭代,该流程在TSMC 16 nm和Intel 14 nm实际项目上得到应用,很大程度地提高了设计效率。 展开更多
关键词 Assert DEVICE CHECKING CIRCUIT CHECK Check/assertion FLOW
下载PDF
Extremist Politics as an Instrument of Ethnic Assertions among the Bodos of Northeast India
2
作者 Susmita Sen Gupta 《Journalism and Mass Communication》 2014年第8期527-534,共8页
Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usuall... Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process. 展开更多
关键词 EXTREMISM extremist politics ethnic assertions conflict management
下载PDF
Literature Assertions of John Dryden Reflected in Mac Flecknoe
3
作者 景韵 《海外英语》 2015年第7期233-235,共3页
John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following t... John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden. 展开更多
关键词 John Dryden MAC Flecknoe LITERATURE assertion
下载PDF
Evaluating and Constraining Hardware Assertions with Absent Scenarios
4
作者 Hui-Na Chao Hua-Wei Li +2 位作者 Xiaoyu Song Tian-Cheng Wang Xiao-Wei Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第5期1198-1216,共19页
Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth... Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth values of the mined assertions.This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios.A Belief-fail Rate metric is proposed to predict the truth/falseness of generated assertions.By considering both the occurrences of free variable assignments and the conflicts of absent scenarios,we use the metric to sort true assertions in higher ranking and false assertions in lower ranking.Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions.The experimental results show that the Belief-failRate framework performs better than the existing methods.In addition,the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods. 展开更多
关键词 hardware formal verification assertion generation data mining assertion evaluation assertion coverage
原文传递
A QUANTIFIER-ELIMINATION BASED HEURISTIC FOR AUTOMATICALLY GENERATING INDUCTIVE ASSERTIONS FOR PROGRAMS 被引量:3
5
作者 Deepak KAPUR 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2006年第3期307-330,共24页
A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are as... A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are associated with program locations. Parameters in inductive assertions are discovered by generating constraints on parameters by ensuring that an inductive assertion is indeed preserved by all execution paths leading to the associated location of the program. The method can be used to discover loop invariants-properties of variables that remain invariant at the entry of a loop. The parameterized formula can be successively refined by considering execution paths one by one; heuristics can be developed for determining the order in which the paths are considered. Initialization of program variables as well as the precondition and postcondition, if available, can also be used to further refine the hypothesized invariant. The method does not depend on the availability of the precondition and postcondition of a program. Constraints on parameters generated in this way are solved for possible values of parameters. If no solution is possible, this means that an invariant of the hypothesized form is not likely to exist for the loop under the assumptions/approximations made to generate the associated verification condition. Otherwise, if the parametric constraints are solvable, then under certain conditions on methods for generating these constraints, the strongest possible invariant of the hypothesized form can be generated from most general solutions of the parametric constraints. The approach is illustrated using the logical languages of conjunction of polynomial equations as well as Presburger arithmetic for expressing assertions. 展开更多
关键词 Automated software analysis and verification inductive assertion loop invariant quantifier elimination.
原文传递
Default Logic About Assertions
6
作者 苏开乐 丁德成 《Science China Mathematics》 SCIE 1994年第11期1399-1408,共10页
G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been g... G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been generalized,a default logic about assertion’s has been obtained,and the assertion that the Brewka’s CDL is a special normal default logic of the new version has been proved. 展开更多
关键词 assertion DEFAULT LOGIC NORMAL default.
原文传递
New method for query answering in semantic web 被引量:1
7
作者 林培光 刘弘 +1 位作者 樊孝忠 王涛 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期319-323,共5页
To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward... To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward. This method converts the knowledge base and query clause into knowledge AG and query AG by making use of the given rules and then makes use of graph traversal to carry out knowledge base retrieval. The experiment indicates that the efficiency of this method exceeds, respectively, the popular RACER and KAON2 system by 0.4% and 3.3%. This method can obviously promote the efficiency of knowledge base retrieval. 展开更多
关键词 description logic assertional graph semantic web information retrieval
下载PDF
基于断言的硬件功能验证技术
8
作者 杜宁 吴国增 《电子测试》 2007年第10期51-53,共3页
针对排除芯片设计流程中RTL级的错误时,需要花费大量时间看仿真波形与日志文件的问题,本文介绍了基于断言的硬件功能验证技术的基础,以及利用断言技术在黑盒验证中测试一设备输出信号时的应用,总结了断言验证的优点,以及断言与半形式化... 针对排除芯片设计流程中RTL级的错误时,需要花费大量时间看仿真波形与日志文件的问题,本文介绍了基于断言的硬件功能验证技术的基础,以及利用断言技术在黑盒验证中测试一设备输出信号时的应用,总结了断言验证的优点,以及断言与半形式化验证结合的特点,断言技术与动态仿真、形式验证、激励自动生成等技术结合,能更快更有效的发现硬件设计过程中RTL级的错误,成为验证方法学的焦点。 展开更多
关键词 断言 OVA(open VERA assertion) ABV 形式化验证
下载PDF
断言技术在SOC验证中的应用
9
作者 丁婷婷 申敏 《山西电子技术》 2007年第5期3-4,27,共3页
主要阐述了基于断言技术新硬件验证平台用于实时监测设计描述是否违反了设计目标,提出了OVA的特点及应用,并以LCD controller的sharp接口时序为实例讲解了该方法的优点。
关键词 检查库 OVA assertion 形式验证 LCD SHARP INTERFACE
下载PDF
SoC中多层AHB总线的断言验证应用 被引量:1
10
作者 宋小明 薛红喜 +1 位作者 刘斌 李宏 《现代电子技术》 2011年第22期84-87,共4页
随着SoC设计复杂程度的不断提高,芯片的功能验证面临的挑战越来越大。断言作为一种描述属性的方法,可以快速地验证设计代码是否满足系统要求。基于断言的验证方法学近年来发展极为迅速,应用也越来越广泛。在基于Multi-layer AHB总线架... 随着SoC设计复杂程度的不断提高,芯片的功能验证面临的挑战越来越大。断言作为一种描述属性的方法,可以快速地验证设计代码是否满足系统要求。基于断言的验证方法学近年来发展极为迅速,应用也越来越广泛。在基于Multi-layer AHB总线架构上的SoC系统验证过程中,采用System Verilog Assertion验证方法,证明SVA是SoC设计过程中功能验证的一种有效的验证方法。 展开更多
关键词 断言 SYSTEM VERILOG assertion AHB 验证
下载PDF
一种基于SAML带自验证的单点登录模型
11
作者 龚家兵 曹彩凤 崔方龙 《计算机系统应用》 2005年第10期54-57,共4页
应用系统的安全问题一直备受重视,身份认证是一种常用的安全实现方式。本文分析了现有的身份认证方式的种种弊端,提出了一种基于SAML技术的带自验证单点登录模型,并对这种模型进行了安全性分析。
关键词 SAML(Security assertion MARKUP Language) 自验证 单点登录 模型 SAML 验证 安全问题
下载PDF
Multiple Factorial Analysis of Symbolic Data 被引量:3
12
作者 Barnabé Tang Ahanda Jean Gérard Aghoukeng Jiofack +1 位作者 Romain Germain Nzangué Gilbert Hapi Mbiakop 《Applied Mathematics》 2012年第12期2148-2154,共7页
This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the rec... This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the reconstitutive coding method for additional individuals in order to conserve the variability of assertion objects. Traditional analysis methods of the main components are applied to coded objects. Certain interpretation aids are presented after the coding process. This method was applied to poverty data. 展开更多
关键词 SYMBOLIC OBJECT assertion OBJECT MULTIPLE FACTORIAL ANALYSIS Principle Components ANALYSIS Poverty
下载PDF
SystemVerilog断言及其应用 被引量:5
13
作者 陈先勇 徐伟俊 +1 位作者 杨鑫 夏宇闻 《中国集成电路》 2007年第9期19-24,共6页
在介绍SystemVerilog断言的概念、使用断言的好处、断言的分类、断言的组成以及断言如何被插入到被测设计(DUT)的基础上,本文详细地介绍了如何使用不同的断言语句对信号之间的复杂时序关系进行严格的检查,并针对每个例子展示了在ModelSi... 在介绍SystemVerilog断言的概念、使用断言的好处、断言的分类、断言的组成以及断言如何被插入到被测设计(DUT)的基础上,本文详细地介绍了如何使用不同的断言语句对信号之间的复杂时序关系进行严格的检查,并针对每个例子展示了在ModelSim6.1b仿真环境中所显示的波形。本文旨在帮助读者理解如何使用断言对设计中信号间复杂时序关系进行验证的方法,并由此介绍一些基本的SystemVerilog断言、操作符、代码段和断言验证方法学。 展开更多
关键词 字:SystemVerilog 断言 DUT SVA assertion
下载PDF
Design and Implementation of DBC Based on Dynamic AOP
14
作者 WEN Jing YING Shi +1 位作者 LI Hui JIA Xiangyang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第2期159-164,共6页
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for... Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at rtmtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain. 展开更多
关键词 design by contract assertion dynamic AOP aspectoriented programming
下载PDF
Intelligent binary schema matching system in heterogeneity environment
15
作者 Mbale J +1 位作者 徐晓飞 邓胜春 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2002年第4期376-382,共7页
For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different... For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different data models. As such, levels of the local schemas are semantically very poor due to the limited expressiveness of traditional data models in which they were designed. Further more, most of the existing schema integration architectural components are inadequately equipped to handle the mapping schemas, especially when the semantics and structural conflicts are involved. This paper introduces an Intelligent Binary Schema Matching system (IBSMS), which exploits the phenomenon of making its components intelligent. That’s equipping its components such as translators and integrators with adequate knowledge about various data models. This allows the components acquire enough intelligence to maneuver or manipulate the correspondence between constructs from different models. In addition, the system has a Binary Matcher, which compares the attribute correspondences of various databases in a pairwise form, in order to establish the equivalences. With the establishment of the mappings, the users shall be able to access them (mappings) for their desired usage. 展开更多
关键词 Inter-schema CORRESPONDENCE assertionS integration rules ATTRIBUTE CORRESPONDENCES semantics mapping and SCHEMA matching
下载PDF
OVA技术在接口时序验证中的应用
16
作者 丁婷婷 申敏 《微计算机信息》 北大核心 2008年第11期117-119,共3页
本文主要阐述了基于断言技术并结合动态仿真,形式测试,测试激励自动化等方法的新硬件验证平台,着重介绍了O-VA的特点及运用,并以LCD controller的sharp接口为实例讲解了该方法的优点。
关键词 OVA assertion 检查库 形式验证 LCDcontrollerSharp
下载PDF
Separation of Fault Tolerance and Non-Functional Concerns: Aspect Oriented Patterns and Evaluation
17
作者 Kashif Hameed Rob Williams Jim Smith 《Journal of Software Engineering and Applications》 2010年第4期303-311,共9页
Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with ... Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and implementation solutions in an aspect oriented framework that modularizes and separates them from core functionality. The degree of separation has been quantified using software metrics. A Lego NXT Robot based case study has been completed to evaluate the proposed design framework. 展开更多
关键词 Aspect Oriented Design and Programming SEPARATION of CONCERNS EXECUTABLE assertionS EXCEPTION Handling Fault Tolerance Software Metrics
下载PDF
断言(assert)在c\c++编程中的使用
18
作者 鲍宁 《无线电工程》 2003年第4期35-36,共2页
该文主要讨论assert宏在c\c++编程中的作用、用法以及使用的原则和注意事项。
关键词 assert 无错代码 DEBUG RELEASE C/C++编程 宏命令
下载PDF
自定义ASSERT宏 被引量:1
19
作者 江华 《电脑编程技巧与维护》 2006年第2期84-87,共4页
提出修改标准的ASSERT宏的方法,对断言进行改进。详细分析在某些场合, 标准断言无法发挥作用的原因,通过分析Windows下的结构化异常处理机制给出修改方案;为了方便进一步修改断言对话框的显示内容和功能,重写调用断言对话框函数。
关键词 ASSERT(断言) 结构化异常处理
下载PDF
Peer educator training program for enhancing knowledge on issues in the growth and development of adolescents and risk behavior problems in Indonesian context
20
作者 Tantut Susanto lis Rahmawati Wantiyah 《Frontiers of Nursing》 CAS 2018年第3期185-191,共7页
Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of ado... Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of adolescents in Indonesia. Methods: The study was conducted in 31 of PEs to evaluate their knowledge in adolescents. The PEs received health education and were assessed by individual work during the structured three-week programme. Data were collected before and after the training programme as pre- and post-tests. Results: The PE demonstrated significant improvements in their knowledge after attending the three-week structured training programme. The post-test scores had significant effects on the dimensions of PE knowledge scores. The PE become knowledgeable to maintain and monitor adolescents health issues around growth and development and its risk behavior problems of adolescents. Conclusions: The PE become knowledgeable to respond to the adolescent problems and readiness to become PE during puberty. 展开更多
关键词 peer educator adolescent development risk behavior assertive
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部