Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advanced techniques for assertion-ba...
~
Heidari Iman, Mohammad Reza.
Linked to FindBook
Google Book
Amazon
博客來
Advanced techniques for assertion-based verification in hardware designs using data mining algorithms
Record Type:
Electronic resources : Monograph/item
Title/Author:
Advanced techniques for assertion-based verification in hardware designs using data mining algorithms/ by Mohammad Reza Heidari Iman.
Author:
Heidari Iman, Mohammad Reza.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xi, 96 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
Introduction -- Background -- State-of-the-art -- Automatic Generation of Assertions for Functional Verification -- Automatic Evaluation and Minimization of Assertions -- Automatic Generation of Assertions for Security Verification -- Conclusion and Future Directions.
Contained By:
Springer Nature eBook
Subject:
Integrated circuits - Verification. -
Online resource:
https://doi.org/10.1007/978-3-031-90410-3
ISBN:
9783031904103
Advanced techniques for assertion-based verification in hardware designs using data mining algorithms
Heidari Iman, Mohammad Reza.
Advanced techniques for assertion-based verification in hardware designs using data mining algorithms
[electronic resource] /by Mohammad Reza Heidari Iman. - Cham :Springer Nature Switzerland :2025. - xi, 96 p. :ill. (chiefly color), digital ;24 cm.
Introduction -- Background -- State-of-the-art -- Automatic Generation of Assertions for Functional Verification -- Automatic Evaluation and Minimization of Assertions -- Automatic Generation of Assertions for Security Verification -- Conclusion and Future Directions.
Mohammad Reza Heidari Iman is a Postdoctoral Researcher at the TIMA Laboratory, Université Grenoble Alpes, France, starting in September 2024. He completed his Ph.D. in the Department of Computer Systems at Tallinn University of Technology, Estonia, in August 2024. His research focuses on Hardware Verification, Assertion-Based Verification, Security and Security Verification of Embedded and Safety-Critical Systems, and the application of Data Mining in Verification and Security.
ISBN: 9783031904103
Standard No.: 10.1007/978-3-031-90410-3doiSubjects--Topical Terms:
827163
Integrated circuits
--Verification.
LC Class. No.: TK7874.58
Dewey Class. No.: 621.3815
Advanced techniques for assertion-based verification in hardware designs using data mining algorithms
LDR
:01837nmm a2200337 a 4500
001
2413498
003
DE-He213
005
20250702130347.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031904103
$q
(electronic bk.)
020
$a
9783031904097
$q
(paper)
024
7
$a
10.1007/978-3-031-90410-3
$2
doi
035
$a
978-3-031-90410-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7874.58
072
7
$a
UKM
$2
bicssc
072
7
$a
COM092000
$2
bisacsh
072
7
$a
UKM
$2
thema
082
0 4
$a
621.3815
$2
23
090
$a
TK7874.58
$b
.H465 2025
100
1
$a
Heidari Iman, Mohammad Reza.
$3
3789617
245
1 0
$a
Advanced techniques for assertion-based verification in hardware designs using data mining algorithms
$h
[electronic resource] /
$c
by Mohammad Reza Heidari Iman.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xi, 96 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
505
0
$a
Introduction -- Background -- State-of-the-art -- Automatic Generation of Assertions for Functional Verification -- Automatic Evaluation and Minimization of Assertions -- Automatic Generation of Assertions for Security Verification -- Conclusion and Future Directions.
520
$a
Mohammad Reza Heidari Iman is a Postdoctoral Researcher at the TIMA Laboratory, Université Grenoble Alpes, France, starting in September 2024. He completed his Ph.D. in the Department of Computer Systems at Tallinn University of Technology, Estonia, in August 2024. His research focuses on Hardware Verification, Assertion-Based Verification, Security and Security Verification of Embedded and Safety-Critical Systems, and the application of Data Mining in Verification and Security.
650
0
$a
Integrated circuits
$x
Verification.
$3
827163
650
0
$a
Computer security.
$3
540555
650
0
$a
Data mining.
$3
562972
650
1 4
$a
Embedded Systems.
$3
3592715
650
2 4
$a
Electronics Design and Verification.
$3
3592716
650
2 4
$a
Electronics and Microelectronics, Instrumentation.
$3
893838
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-90410-3
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9518953
電子資源
11.線上閱覽_V
電子書
EB TK7874.58
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login