{"id":81250,"date":"2024-10-17T18:52:50","date_gmt":"2024-10-17T18:52:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1647-2006\/"},"modified":"2024-10-24T19:46:09","modified_gmt":"2024-10-24T19:46:09","slug":"ieee-1647-2006","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1647-2006\/","title":{"rendered":"IEEE 1647 2006"},"content":{"rendered":"

New IEEE Standard – Inactive – Superseded. The e functional verification language is an application-specific programming language, aimed at automating the task of verifying an electronic design with respect to its specification. Verification environments written in e provide a model of the environment in which the design is expected to function, including the kinds of erroneous conditions the design needs to withstand. A typical verification environment is capable of generating user-controlled test inputs with statistically interesting characteristics. Such an environment can check the validity of the design responses. Functional coverage metrics are used to control the verification effort and gauge the quality of the design. e verification environments can be used throughout the design cycle, from a high-level architectural model to a fully realized system. This standard contains a definition of the e language syntax and semantics, and how tool developers and verification engineers should use them.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 1647-2006 <\/td>\n<\/tr>\n
3<\/td>\nIEEE Standard for the Functional Verification Language ‘e’ <\/td>\n<\/tr>\n
4<\/td>\nAbstract\/Keywords <\/td>\n<\/tr>\n
6<\/td>\nIntroduction <\/td>\n<\/tr>\n
7<\/td>\nNotice to users <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nContents <\/td>\n<\/tr>\n
15<\/td>\n1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
16<\/td>\n1.3 Basic concepts relating to this standard <\/td>\n<\/tr>\n
22<\/td>\n1.4 Conventions used <\/td>\n<\/tr>\n
23<\/td>\n1.5 Contents of this standard <\/td>\n<\/tr>\n
25<\/td>\n2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions <\/td>\n<\/tr>\n
27<\/td>\n3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
29<\/td>\n4. e basics
4.1 Lexical conventions <\/td>\n<\/tr>\n
36<\/td>\n4.2 Syntactic elements <\/td>\n<\/tr>\n
42<\/td>\n4.3 Struct hierarchy and name resolution <\/td>\n<\/tr>\n
48<\/td>\n4.4 Ranges <\/td>\n<\/tr>\n
49<\/td>\n4.5 Operator precedence <\/td>\n<\/tr>\n
50<\/td>\n4.6 Evaluation order of expressions
4.7 Bitwise operators <\/td>\n<\/tr>\n
52<\/td>\n4.8 Boolean operators <\/td>\n<\/tr>\n
54<\/td>\n4.9 Arithmetic operators <\/td>\n<\/tr>\n
55<\/td>\n4.10 Comparison operators <\/td>\n<\/tr>\n
59<\/td>\n4.11 String matching <\/td>\n<\/tr>\n
62<\/td>\n4.12 Extraction and concatenation operators <\/td>\n<\/tr>\n
66<\/td>\n4.13 Scalar modifiers
4.14 Parentheses <\/td>\n<\/tr>\n
67<\/td>\n4.15 list.method()
4.16 Special-purpose operators <\/td>\n<\/tr>\n
71<\/td>\n5. Data types
5.1 e data types <\/td>\n<\/tr>\n
76<\/td>\n5.2 Untyped expressions <\/td>\n<\/tr>\n
77<\/td>\n5.3 Assignment rules <\/td>\n<\/tr>\n
80<\/td>\n5.4 Precision rules for numeric operations <\/td>\n<\/tr>\n
82<\/td>\n5.5 Automatic type casting
5.6 Defining and extending scalar types <\/td>\n<\/tr>\n
85<\/td>\n5.7 Explicit type conversion <\/td>\n<\/tr>\n
91<\/td>\n6. Structs, subtypes, and fields
6.1 Structs overview
6.2 Defining structs: struct <\/td>\n<\/tr>\n
92<\/td>\n6.3 Extending structs: extend type <\/td>\n<\/tr>\n
93<\/td>\n6.4 Restrictions on inheritance
6.5 Extending subtypes
6.6 Creating subtypes with when <\/td>\n<\/tr>\n
95<\/td>\n6.7 Extending when subtypes <\/td>\n<\/tr>\n
96<\/td>\n6.8 Defining fields: field <\/td>\n<\/tr>\n
97<\/td>\n6.9 Defining list fields <\/td>\n<\/tr>\n
99<\/td>\n6.10 Projecting list of fields
6.11 Defining attribute fields <\/td>\n<\/tr>\n
101<\/td>\n7. Units
7.1 Overview <\/td>\n<\/tr>\n
103<\/td>\n7.2 Defining units and fields of type unit <\/td>\n<\/tr>\n
107<\/td>\n7.3 Unit attributes <\/td>\n<\/tr>\n
108<\/td>\n7.4 Predefined methods of any_unit <\/td>\n<\/tr>\n
110<\/td>\n7.5 Unit-related predefined methods of any_struct <\/td>\n<\/tr>\n
112<\/td>\n7.6 Unit-related predefined routines <\/td>\n<\/tr>\n
115<\/td>\n8. e ports
8.1 Introduction to e ports <\/td>\n<\/tr>\n
116<\/td>\n8.2 Using simple ports <\/td>\n<\/tr>\n
118<\/td>\n8.3 Using buffer ports <\/td>\n<\/tr>\n
119<\/td>\n8.4 Using event ports <\/td>\n<\/tr>\n
120<\/td>\n8.5 Defining and referencing ports <\/td>\n<\/tr>\n
123<\/td>\n8.6 Port attributes <\/td>\n<\/tr>\n
135<\/td>\n8.7 Buffer port methods <\/td>\n<\/tr>\n
137<\/td>\n8.8 MVL methods for simple ports <\/td>\n<\/tr>\n
143<\/td>\n8.9 Global MVL routines <\/td>\n<\/tr>\n
146<\/td>\n8.10 Comparative analysis of ports and tick access <\/td>\n<\/tr>\n
149<\/td>\n9. Constraints and generation
9.1 Types of constraints
9.2 Generation concepts <\/td>\n<\/tr>\n
162<\/td>\n9.3 Defining constraints <\/td>\n<\/tr>\n
169<\/td>\n9.4 Invoking generation <\/td>\n<\/tr>\n
171<\/td>\n10. Events
10.1 Causes of events
10.2 Scope of events
10.3 Defining and emitting named events <\/td>\n<\/tr>\n
172<\/td>\n10.4 Predefined events <\/td>\n<\/tr>\n
175<\/td>\n11. Temporal expressions
11.1 Overview <\/td>\n<\/tr>\n
178<\/td>\n11.2 Temporal operators and constructs <\/td>\n<\/tr>\n
193<\/td>\n11.3 Success and failure of a temporal expression <\/td>\n<\/tr>\n
195<\/td>\n12. Temporal struct members
12.1 on <\/td>\n<\/tr>\n
196<\/td>\n12.2 expect | assume <\/td>\n<\/tr>\n
197<\/td>\n13. Time-consuming actions
13.1 Synchronization actions <\/td>\n<\/tr>\n
198<\/td>\n13.2 Concurrency actions <\/td>\n<\/tr>\n
200<\/td>\n13.3 State machines <\/td>\n<\/tr>\n
205<\/td>\n14. Coverage constructs
14.1 Defining coverage groups: cover <\/td>\n<\/tr>\n
207<\/td>\n14.2 Defining basic coverage items: item <\/td>\n<\/tr>\n
211<\/td>\n14.3 Defining cross coverage items: cross <\/td>\n<\/tr>\n
213<\/td>\n14.4 Defining transition coverage items: transition <\/td>\n<\/tr>\n
215<\/td>\n14.5 Extending coverage groups: cover … using also … is also <\/td>\n<\/tr>\n
216<\/td>\n14.6 Extending coverage items: item … using also
14.7 Coverage API methods <\/td>\n<\/tr>\n
220<\/td>\n14.8 Coverage methods for the covers struct <\/td>\n<\/tr>\n
225<\/td>\n15. Macros
15.1 Syntax overview
15.2 Defining a macro <\/td>\n<\/tr>\n
226<\/td>\n15.3 Match expression structure <\/td>\n<\/tr>\n
227<\/td>\n15.4 Interpretation of match expressions <\/td>\n<\/tr>\n
228<\/td>\n15.5 Replacement code <\/td>\n<\/tr>\n
231<\/td>\n16. Print, checks, and error handling
16.1 print
16.2 Handling DUT errors <\/td>\n<\/tr>\n
235<\/td>\n16.3 Handling user errors <\/td>\n<\/tr>\n
237<\/td>\n16.4 Handling programming errors: assert <\/td>\n<\/tr>\n
239<\/td>\n17. Methods
17.1 Rules for defining and extending methods <\/td>\n<\/tr>\n
247<\/td>\n17.2 Invoking methods <\/td>\n<\/tr>\n
250<\/td>\n17.3 Parameter passing <\/td>\n<\/tr>\n
252<\/td>\n17.4 Using the C interface <\/td>\n<\/tr>\n
255<\/td>\n18. Creating and modifying e variables
18.1 About e variables
18.2 var <\/td>\n<\/tr>\n
256<\/td>\n18.3 =
18.4 op= <\/td>\n<\/tr>\n
257<\/td>\n18.5 <= <\/td>\n<\/tr>\n
259<\/td>\n19. Packing and unpacking
19.1 Basic packing <\/td>\n<\/tr>\n
262<\/td>\n19.2 Predefined pack options <\/td>\n<\/tr>\n
263<\/td>\n19.3 Customizing pack options
19.4 Packing and unpacking specific types <\/td>\n<\/tr>\n
268<\/td>\n19.5 Implicit packing and unpacking <\/td>\n<\/tr>\n
271<\/td>\n20. Control flow actions
20.1 Conditional actions <\/td>\n<\/tr>\n
273<\/td>\n20.2 Iterative actions <\/td>\n<\/tr>\n
277<\/td>\n20.3 File iteration actions <\/td>\n<\/tr>\n
278<\/td>\n20.4 Actions for controlling the program flow <\/td>\n<\/tr>\n
279<\/td>\n21. Importing and preprocessor directives
21.1 Importing e modules <\/td>\n<\/tr>\n
280<\/td>\n21.2 #ifdef, #ifndef <\/td>\n<\/tr>\n
281<\/td>\n21.3 #define <\/td>\n<\/tr>\n
282<\/td>\n21.4 #undef <\/td>\n<\/tr>\n
283<\/td>\n22. Encapsulation constructs
22.1 package: package-name
22.2 package: type-declaration <\/td>\n<\/tr>\n
284<\/td>\n22.3 package | protected | private: struct-member <\/td>\n<\/tr>\n
285<\/td>\n23. Simulation-related constructs
23.1 force
23.2 release <\/td>\n<\/tr>\n
286<\/td>\n23.3 Tick access: ‘hdl-pathname’
23.4 simulator_command() <\/td>\n<\/tr>\n
287<\/td>\n23.5 stop_run() <\/td>\n<\/tr>\n
289<\/td>\n24. List pseudo-methods library
24.1 Pseudo-methods overview
24.2 Using list pseudo-methods
24.3 Pseudo-methods to modify lists <\/td>\n<\/tr>\n
298<\/td>\n24.4 General list pseudo-methods <\/td>\n<\/tr>\n
312<\/td>\n24.5 Math and logic pseudo-methods <\/td>\n<\/tr>\n
314<\/td>\n24.6 List CRC pseudo-methods <\/td>\n<\/tr>\n
316<\/td>\n24.7 Keyed list pseudo-methods <\/td>\n<\/tr>\n
319<\/td>\n25. Predefined methods library
25.1 Predefined methods of sys
25.2 Predefined methods of any_struct <\/td>\n<\/tr>\n
322<\/td>\n25.3 Methods and predefined attributes of unit any_unit
25.4 Pseudo-methods <\/td>\n<\/tr>\n
324<\/td>\n25.5 Coverage methods <\/td>\n<\/tr>\n
325<\/td>\n26. Predefined routines library
26.1 Deep copy and compare routines <\/td>\n<\/tr>\n
328<\/td>\n26.2 Arithmetic routines <\/td>\n<\/tr>\n
332<\/td>\n26.3 bitwise_op() <\/td>\n<\/tr>\n
333<\/td>\n26.4 get_all_units()
26.5 String routines <\/td>\n<\/tr>\n
341<\/td>\n26.6 Output routines <\/td>\n<\/tr>\n
343<\/td>\n26.7 Operating system interface routines <\/td>\n<\/tr>\n
346<\/td>\n26.8 set_config() <\/td>\n<\/tr>\n
347<\/td>\n27. Predefined file routines library
27.1 File names and search paths
27.2 File handles
27.3 Low-level file methods <\/td>\n<\/tr>\n
352<\/td>\n27.4 General file routines <\/td>\n<\/tr>\n
358<\/td>\n27.5 Reading and writing structs <\/td>\n<\/tr>\n
363<\/td>\n28. Predefined resource sharing control structs
28.1 Semaphore methods <\/td>\n<\/tr>\n
364<\/td>\n28.2 How to use the semaphore struct <\/td>\n<\/tr>\n
369<\/td>\nAnnex A (normative) Source code serialization <\/td>\n<\/tr>\n
377<\/td>\nAnnex B (informative) Compariosn of when and like inheritance <\/td>\n<\/tr>\n
385<\/td>\nAnnex C (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Standard for the Functional Verification Language ‘e’<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2006<\/td>\n385<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":81251,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-81250","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/81250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/81251"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=81250"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=81250"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=81250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}