2010 East-West Design &Amp; Test Symposium (EWDTS) 2010
DOI: 10.1109/ewdts.2010.5742074
|View full text |Cite
|
Sign up to set email alerts
|

A TLM2.0 assertion library with centralized monitoring approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Several works, such as [20][21][22], among others, use this approach to perform systemlevel verification. Other works use the same approach to perform tracking/snooping of the transactions interchanged between TLM modules, for example [23,24]. Assertions are usually written in specific languages such as Property Specification Language (PSL) and they must be translated to specific assertion code that must be placed in between the transaction's initiators and targets.…”
Section: Papermentioning
confidence: 99%
“…Several works, such as [20][21][22], among others, use this approach to perform systemlevel verification. Other works use the same approach to perform tracking/snooping of the transactions interchanged between TLM modules, for example [23,24]. Assertions are usually written in specific languages such as Property Specification Language (PSL) and they must be translated to specific assertion code that must be placed in between the transaction's initiators and targets.…”
Section: Papermentioning
confidence: 99%