ELECTRONIC DESIGN AUTOMATION EDA PRODUCT

Brand Owner (click to sort) Address Description
HES ALDEC, INC. Suite 490 2260 Corporate Circle Henderson NV 89074 Electronic Design Automation (EDA) product for hardware assisted simulation of VHDL and Verilog hardware description language (HDL) designs. The product will co-simulate designs with software on event-by-event basis with RTL simulators. The hardware supports Windows, UNIX and Linux Operating Systems, based on a PCI interface;
HES ALDEC, INC. Suite 490 2260 Corporate Circle Henderson NV 89074 Electronic Design Automation (EDA) product for hardware assisted simulation of VHDL and Verilog hardware description language (HDL) designs. The product will co-simulate designs with software on event-by-event basis with RTL simulators. The hardware supports Windows, UNIX and Linux operating platforms based on a PCI interface.;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Described herein are methods and systems for secure exchange of information related to electronic design automation. Information deemed sensitive and otherwise worthy of protection may be secured by methods such as encryption, obfuscation and other security measures. The secured information may be provided to an electronic design automation tool for processing without revealing at least some of the secured information. For instance, rule files related to integrated circuit manufacturability may be selectively annotated to indicate portions thereof deserving of protection. An encryption tool may be used to secure the information so indicated and generate a file comprising secured information related to electronic design automation. An electronic design automation tool may then unlock and use the secured information without revealing the same. For instance, the tool may be a physical verification tool capable of verifying whether any of the one or more integrated circuit layouts may violate one or more of the secured rules. An error report may be generated without revealing the secured rules.