CN116383155A - Log query system based on EDA verification simulator - Google Patents

Log query system based on EDA verification simulator Download PDF

Info

Publication number
CN116383155A
CN116383155A CN202310654066.1A CN202310654066A CN116383155A CN 116383155 A CN116383155 A CN 116383155A CN 202310654066 A CN202310654066 A CN 202310654066A CN 116383155 A CN116383155 A CN 116383155A
Authority
CN
China
Prior art keywords
log
test
information
key
val
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310654066.1A
Other languages
Chinese (zh)
Other versions
CN116383155B (en
Inventor
向君
王宜春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Rongjian Software Technology Co ltd
Shanghai Hejian Industrial Software Group Co Ltd
Original Assignee
Chengdu Rongjian Software Technology Co ltd
Shanghai Hejian Industrial Software Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Rongjian Software Technology Co ltd, Shanghai Hejian Industrial Software Group Co Ltd filed Critical Chengdu Rongjian Software Technology Co ltd
Priority to CN202310654066.1A priority Critical patent/CN116383155B/en
Publication of CN116383155A publication Critical patent/CN116383155A/en
Application granted granted Critical
Publication of CN116383155B publication Critical patent/CN116383155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/168Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the technical field of chip verification, in particular to a log query system based on an EDA verification simulator, which comprises a simulator, a log collection unit, a log database and a log query unit, wherein the simulator is used for testing a Test case k Extracting log information log of the (r) th log when simulation is carried out r And send to a log collection unit, which receives Test sent by the simulator k L log information logs generated by simulation, and extracting key value pair information according to the logs to obtain Test k Log information KV k KV is taken as k Writing into a log database; the log inquiry unit is used for inquiring the log according to the Test appointed by the user k Reading KV in log database k And further according to user-specified key f Searching the associated key value list to obtain a list item, and further realizingThe purpose of visually classifying log information is now performed.

Description

Log query system based on EDA verification simulator
Technical Field
The invention relates to the technical field of chip verification, in particular to a log query system based on an EDA verification simulator.
Background
In the current industrial software debug system, all log query systems are based on log text files, and query is performed to find out problems. In general, the same source file corresponds to a plurality of test cases, each test case generates a log file in each simulation, so that the same source file generates a large number of log files, the log files are also scattered, a user needs to open one by one to check when checking the log files, the contents in the log files are scattered, the user needs to search through keywords to check the simulation results of the same type one by one, the overall classification result is difficult to master, the user consumes much time and effort in use, and the user is difficult to really help the user find useful information.
Disclosure of Invention
Aiming at the technical problems, the invention adopts the following technical scheme: a log query system based on an EDA verification simulator, the system comprising a simulator, a log collection unit, a log database, a log query unit, wherein:
the simulator is based on the kth Test case Test k Simulating source file to generate L log information log = { log 1 ,log 2 ,…,log r ,…,log L R has a value in the range of 1 to L; extracting log information log of the r-th log r And send to the log collecting unit; wherein log r ={log r,1 ,log r,2 ,…,log r,j ,…,log r,J },log r,j Is log of r The J-th type of log information in the database is in the range of 1 to J, and J is the type number of the log information.
The log collecting unit receives Test sent by the simulator k Log information log generated by simulation; and obtaining Test according to log extraction key value pair information k Log extraction of information KV k KV is taken as k Writing into a log database; wherein KV is as follows k ={kv 1 ,kv 2 ,…,kv f ,…,kv F },kv f For the f key extracted f The value range of F is 1 to F, and F is the number of key value pair information; kv (Kidney) f Including keys f And key f Associated key value list val f ={val f,1 ,val f,2 ,…,val f,t ,…,val f,T },val f,t Is key f Associated T-th key value, wherein the value range of T is 1 to T, and T is key f Number of associated key values.
The log database stores K Test cases { Test }, which are used for testing 1 ,Test 2 ,…,Test k ,…Test K Log extraction information kv= { KV = { 1 ,KV 2 ,…,KV k ,…,KV K And K has a value ranging from 1 to K.
The log query unit comprises a user query module, a first visualization module and a second visualization module, wherein the user query module acquires a Test case Test appointed by a user k And a screening item including all keys extracted by all test cases; the first visualization module is used for displaying the Test specified by the user k Reading KV stored in log database k And presented; the second visualization module is used for displaying the information according to the Test designated by the user k And a user-specified key f KV from log database k Middle search key f Associated val f And generates a list entry it= { IT 1 ,IT 2 ,…,IT t ,…,IT T },IT t For the t-th list entry, IT t Including val f,t And associated R types of log information, wherein R is less than or equal to J.
Compared with the prior art, the log query system based on the EDA verification simulator has obvious beneficial effects, can achieve quite technical progress and practicality, has wide industrial utilization value, and has at least the following beneficial effects:
the invention provides a log query system based on an EDA verification simulator, which comprises a simulator, a log collection unit, a log database and a log query unit, wherein the simulator is used for testing a Test case Test k Extracting during simulationLog information log of the (th) log r And send to a log collection unit, which receives Test sent by the simulator k L log information logs generated by simulation, and extracting key value pair information according to the logs to obtain Test k Log information KV k KV is taken as k Writing into a log database; the log inquiry unit is used for inquiring the log according to the Test appointed by the user k Reading KV in log database k And further according to user-specified key f And searching the associated key value list to obtain a list entry, so as to realize the purpose of visually classifying the log information. In addition, all log information is presented through the first visualization module, so that a user can conveniently check corresponding context information.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a block diagram of a log query system based on an EDA verification simulator according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
Referring to FIG. 1, a block diagram of a log query system based on an EDA verification simulator is shown, the system comprising a simulator, a log collection unit, a log database, and a log query unit.
Further, the simulator is based on the kth Test case Test k Simulation of source files to generate LLog information log= { log 1 ,log 2 ,…,log r ,…,log L R has a value in the range of 1 to L; extracting log information log of the r-th log r And send to the log collecting unit; wherein log r ={log r,1 ,log r,2 ,…,log r,j ,…,log r,J },log r,j Is log of r The J-th type of log information in the database is in the range of 1 to J, and J is the type number of the log information.
Wherein the simulator is EDA industrial software. Alternatively, the simulator is a simulation simulator, and other EDA verification simulators in the art are within the scope of the present invention.
It should be noted that, the simulator extracts the corresponding log information according to the preset format, and the types of the log information contained in any two pieces of the extracted log information are the same.
Optionally, the extracted log information log r Including at least one Type of log information among emulation Time (Time), log information Type (Type), source file Location (Location), and log Location tag (MessageID). Wherein Time is the Time of executing the dump function; at Test k Including a plurality of dump functions, each dump function corresponding to a simulation time. Types include Error Type (Error), warning Type (Warning), normal Type (Info) and deadline Type (Fatal). Location includes Test case Test k And the line number of the extracted current log information in the source file. The MessageID is a line number of a specific log information (Message) in a log file.
As one example, log when the simulator extracts four types of simulation time, log information type, source file location, and key value r Including the specific point in time of the simulation, error, test_1.Sv (54), and Message, where test_1.Sv (54) includes Test case Test k The name test_1.Sv and the line number 54 of the extracted current log information in the source file, the message may be the log information "hello world" or "uvm_info test.sv (11) @300: report (MYINFO) hello UVM" or "$error [ test.sv: 12) of the simulation output]-failed ", etc.
Optionally, the simulator presets that the extracted log information includes a simulation time, a log information type and a log location tag.
As a preferred embodiment, the simulator presets that the extracted log information includes simulation time, log information type, source file location, and log location tag.
As a preferred embodiment, the log information log of the (r) th log is extracted r The method comprises the following steps: acquiring a preset dump function, and acquiring log according to a simulation result of the preset dump function r . The preset dump function may be a standard dump function in a high-level programming language, or may be a dump function customized by a user. Alternatively, the key value pair information may be log information normally output after the corresponding function is simulated, or may be log information generated according to a unified standard format. Preferably, when the preset dump function is a standard dump function in UVM, the key value pair information is log information generated according to a unified standard format. As an example, a predefined dump function in UVM, such as UVM _info macro, UVM _error macro, UVM _far macro, UVM _rolling macro, or the like, generates log information in a standard format unified by UVM at the time of simulation. For another example, dump functions predefined in the System Verilog include display function and monitor function, and log information is generated according to the result output by the function during simulation.
Note that each piece of log information contains J types of log information.
It should be noted that the same source program may perform multiple simulations, and each simulation may have the same test case or different test cases.
Further, the log collection unit receives Test transmitted by the emulator k Log information log generated by simulation; and obtaining Test according to log extraction key value pair information k Log extraction of information KV k KV is taken as k Writing into a log database; wherein KV is as follows k ={kv 1 ,kv 2 ,…,kv f ,…,kv F },kv f For the f key extracted f The value range of F is 1 to F, F is the number of key value pair information;kv f Including keys f And key f Associated key value list val f ={val f,1 ,val f,2 ,…,val f,t ,…,val f,T },val f,t Is key f Associated T-th key value, wherein the value range of T is 1 to T, and T is key f Number of associated key values.
Optionally, log information KV k May be log information contained in the generated log file; the log information generated by the simulator in the simulation process can be stored in the database, but the log file is not generated.
KV as a preferred embodiment k The keys of (a) include: simulation time, log information type, source file location, and log location tag. Specifically, the simulation time, the log information type and the key value of the source file position are all corresponding log position labels, the key value of the log position label is specific log information, and the setting of the log position label can greatly reduce the storage space occupied by repeated specific log information in the database.
Note that, for the simulation time, the log information type, the source file location, and the log location tag, when each type of log information is used as a key, each specific log information is a key. As an example, when the emulated time is used as a key and the log location label is the corresponding key value, a particular emulated point in time is a key f Different simulation time points are different keys, and a key value list val is formed by corresponding to a plurality of different log position labels at the same simulation time point f . For another example, when the log information type is used as a key and the log location tag is a key value, one log information type is a key, e.g., error is a key f Error forms a key value list val corresponding to a plurality of different log position labels f
It will be appreciated that KV k And writing the extracted key value list into the log database in batches by adopting a batch writing interface function in a mode of writing the log database.
Further, the log database stores K Test cases { Test ] 1 ,Test 2 ,…,Test k ,…Test K Log information kv= { KV generated at simulation time 1 ,KV 2 ,…,KV k ,…,KV K And K has a value ranging from 1 to K.
Alternatively, the K test cases are test cases of the same source file. It should be noted that, log information corresponding to W source files is stored in the log database, and each source file includes at least one test case, where the value range of W is greater than or equal to 1.
As a preferred embodiment, the log database is a key value database. Optionally, the key value is a Redis database.
Further, the log query unit comprises a user query module, a first visualization module and a second visualization module, wherein the user query module obtains a Test case Test appointed by a user k And a screening item including all keys extracted by all test cases; the first visualization module is used for displaying the Test specified by the user k Reading KV stored in log database k And presented; the second visualization module is used for displaying the information according to the Test designated by the user k And a user-specified key f KV from log database k Middle search key f Associated val f And generates a list entry it= { IT 1 ,IT 2 ,…,IT t ,…,IT T },IT t For the t-th list entry, IT t Including val f,t And associated R types of log information, wherein R is less than or equal to J. And screening list items related to the screening items according to the screening items designated by the user, so as to achieve the purpose of classifying log information.
IT should be noted that when IT t In which the key value is space-time explanatory key f There is no associated key value. When val f,t And key f When associated, it is not associated with key f Other keys of the belonging type, i.e. with one and only one key of each type being associated with val f,t And (5) association.
It should be noted that, the number R of types of keys in the list entry presented in the second visualization module may be J or less.As a preferred embodiment, when the Tkey includes the emulated time, log information type, source file location, and log location tag, the log location tag is not included in the list entries presented in the second visualization module, but only the emulated time, log information type, and source file location. And key is f Associated val f,t Key value for log position label, i.e. val f,t Is specific log information (Message).
As a preferred embodiment, when a user is to IT t When positioning operation is executed, the first visualization module jumps to KV k Middle val f,t To facilitate viewing val in the log f,t Context information of (a). Optionally, the positioning operation triggers the same designated operation twice in succession within a preset time period.
As an example, when a key f When error is adopted, the corresponding key value list is { msg14, msg25, … … }, wherein msg14 and msg25 are log position labels for generating log information respectively.
As a preferred embodiment, the step of generating the list entry IT comprises: obtaining val f,t The log information of each key value in the list is obtained, and N key types associated with the log information are obtained.
Further, the log query system may also include a debugging system for updating the first visualization module and the second visualization module.
In summary, the embodiment of the invention provides a log query system based on EDA verification simulator, which comprises a simulator, a log collection unit, a log database and a log query unit, wherein the simulator is used for testing a Test case k Extracting log information log of the (r) th log when simulation is carried out r And send to a log collection unit, which receives Test sent by the simulator k L log information logs generated by simulation, and extracting key value pair information according to the logs to obtain Test k Log information KV k KV is taken as k Writing into a log database; the log inquiry unit is used for inquiring the log according to the Test appointed by the user k Reading KV in log database k And further according to user-specified key f And searching the associated key value list to obtain a list entry, so as to realize the purpose of visually classifying the log information.
While certain specific embodiments of the invention have been described in detail by way of example, it will be appreciated by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the invention. Those skilled in the art will also appreciate that many modifications may be made to the embodiments without departing from the scope and spirit of the invention. The scope of the invention is defined by the appended claims.

Claims (8)

1. A log query system based on an EDA verification simulator, the system comprising a simulator, a log collection unit, a log database, a log query unit, wherein:
the simulator is based on the kth Test case Test k Simulating source file to generate L log information log = { log 1 ,log 2 ,…,log r ,…,log L R has a value in the range of 1 to L; extracting log information log of the r-th log r And send to the log collecting unit; wherein log r ={log r,1 ,log r,2 ,…,log r,j ,…,log r,J },log r,j Is log of r The value range of J is 1 to J, and J is the type number of the log information;
the log collecting unit receives Test sent by the simulator k Log generated by simulation; and obtaining Test according to log extraction key value pair information k Log extraction of information KV k KV is taken as k Writing into a log database; wherein KV is as follows k ={kv 1 ,kv 2 ,…,kv f ,…,kv F },kv f For the f key extracted f The value range of F is 1 to F, and F is the number of key value pair information; kv (Kidney) f Including keys f And key f Associated key value list val f ={val f,1 ,val f,2 ,…,val f,t ,…,val f,T },val f,t Is key f Associated T-th key value, wherein the value range of T is 1 to T, and T is key f The number of associated key values;
the log database stores K Test cases { Test }, which are used for testing 1 ,Test 2 ,…,Test k ,…Test K Log extraction information kv= { KV = { 1 ,KV 2 ,…,KV k ,…,KV K -wherein K has a value in the range of 1 to K;
the log query unit comprises a user query module, a first visualization module and a second visualization module, wherein the user query module acquires a Test case Test appointed by a user k And a screening item including all keys extracted by all test cases; the first visualization module is used for displaying the Test specified by the user k Reading KV stored in log database k And presented; the second visualization module is used for displaying the information according to the Test designated by the user k And a user-specified key f KV from log database k Middle search key f Associated val f And generates a list entry it= { IT 1 ,IT 2 ,…,IT t ,…,IT T },IT t For the t-th list entry, IT t Including val f,t And associated R types of log information, wherein R is less than or equal to J.
2. The system of claim 1, wherein when a user is to IT t When positioning operation is executed, the first visualization module jumps to KV k Middle val f,t Is a position of (c).
3. The system of claim 1, wherein the log r Including at least one type of log information from among simulation time, log information type, source file location, and log location tags.
4. The system of claim 3, wherein the source file location comprises a Test k And the line number of the extracted current log information in the source file.
5. The system of claim 3, wherein the KV is k The keys of (a) include: simulation time, log information type, source file location, and log location tag.
6. The system of claim 1, wherein the extracting of the r-th log information log r The method comprises the following steps:
acquiring a preset dump function, and acquiring log according to a simulation result of the preset dump function r
7. The system of claim 1, wherein the log database is a key-value database.
8. The system of claim 1, wherein the K test cases are test cases of a same source file.
CN202310654066.1A 2023-06-05 2023-06-05 Log query system based on EDA verification simulator Active CN116383155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310654066.1A CN116383155B (en) 2023-06-05 2023-06-05 Log query system based on EDA verification simulator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310654066.1A CN116383155B (en) 2023-06-05 2023-06-05 Log query system based on EDA verification simulator

Publications (2)

Publication Number Publication Date
CN116383155A true CN116383155A (en) 2023-07-04
CN116383155B CN116383155B (en) 2023-08-11

Family

ID=86977283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310654066.1A Active CN116383155B (en) 2023-06-05 2023-06-05 Log query system based on EDA verification simulator

Country Status (1)

Country Link
CN (1) CN116383155B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117112618A (en) * 2023-10-25 2023-11-24 上海合见工业软件集团有限公司 EDA software data query method, electronic device and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101676920A (en) * 2008-09-15 2010-03-24 新思科技有限公司 Method and apparatus for merging EDA coverage logs of coverage data
US20100204975A1 (en) * 2007-10-15 2010-08-12 Fujitsu Limited Simulation method, electronic apparatus design method, and simulation apparatus
WO2019060326A1 (en) * 2017-09-20 2019-03-28 University Of Utah Research Foundation Parsing system event logs while streaming
US10445290B1 (en) * 2014-10-29 2019-10-15 Cadence Design Systems, Inc. System and method for a smart configurable high performance interactive log file viewer
US10606825B1 (en) * 2017-02-28 2020-03-31 Synack, Inc. Flexible installation of data type validation instructions for security data for analytics applications
CN112953896A (en) * 2021-01-26 2021-06-11 杭州迪普科技股份有限公司 Playback method and device of log message
CN113342632A (en) * 2021-07-07 2021-09-03 北京物芯科技有限责任公司 Simulation data automatic processing method and device, electronic equipment and storage medium
WO2021189954A1 (en) * 2020-10-12 2021-09-30 平安科技(深圳)有限公司 Log data processing method and apparatus, computer device, and storage medium
CN114185807A (en) * 2021-12-17 2022-03-15 平安付科技服务有限公司 Test data management method and device, computer equipment and storage medium
CN114253909A (en) * 2021-11-26 2022-03-29 山东云海国创云计算装备产业创新中心有限公司 Simulation result analysis method and system, computer equipment and storage medium
CN114721986A (en) * 2022-06-09 2022-07-08 井芯微电子技术(天津)有限公司 Heterogeneous direct memory access verification method and system based on general verification method
CN114781293A (en) * 2022-04-26 2022-07-22 山东云海国创云计算装备产业创新中心有限公司 Chip bottleneck analysis method, device, equipment and medium
CN114818565A (en) * 2022-05-11 2022-07-29 杭州云合智网技术有限公司 Simulation environment management platform, method, equipment and medium based on python
CN115630036A (en) * 2022-11-14 2023-01-20 英诺达(成都)电子科技有限公司 Error information processing method, apparatus, device, storage medium and program product

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100204975A1 (en) * 2007-10-15 2010-08-12 Fujitsu Limited Simulation method, electronic apparatus design method, and simulation apparatus
CN101676920A (en) * 2008-09-15 2010-03-24 新思科技有限公司 Method and apparatus for merging EDA coverage logs of coverage data
US10445290B1 (en) * 2014-10-29 2019-10-15 Cadence Design Systems, Inc. System and method for a smart configurable high performance interactive log file viewer
US10606825B1 (en) * 2017-02-28 2020-03-31 Synack, Inc. Flexible installation of data type validation instructions for security data for analytics applications
WO2019060326A1 (en) * 2017-09-20 2019-03-28 University Of Utah Research Foundation Parsing system event logs while streaming
WO2021189954A1 (en) * 2020-10-12 2021-09-30 平安科技(深圳)有限公司 Log data processing method and apparatus, computer device, and storage medium
CN112953896A (en) * 2021-01-26 2021-06-11 杭州迪普科技股份有限公司 Playback method and device of log message
CN113342632A (en) * 2021-07-07 2021-09-03 北京物芯科技有限责任公司 Simulation data automatic processing method and device, electronic equipment and storage medium
CN114253909A (en) * 2021-11-26 2022-03-29 山东云海国创云计算装备产业创新中心有限公司 Simulation result analysis method and system, computer equipment and storage medium
CN114185807A (en) * 2021-12-17 2022-03-15 平安付科技服务有限公司 Test data management method and device, computer equipment and storage medium
CN114781293A (en) * 2022-04-26 2022-07-22 山东云海国创云计算装备产业创新中心有限公司 Chip bottleneck analysis method, device, equipment and medium
CN114818565A (en) * 2022-05-11 2022-07-29 杭州云合智网技术有限公司 Simulation environment management platform, method, equipment and medium based on python
CN114721986A (en) * 2022-06-09 2022-07-08 井芯微电子技术(天津)有限公司 Heterogeneous direct memory access verification method and system based on general verification method
CN115630036A (en) * 2022-11-14 2023-01-20 英诺达(成都)电子科技有限公司 Error information processing method, apparatus, device, storage medium and program product

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ITESTER软件测试小栈: "作为测试人,如何优雅的查看Log日志?", pages 1, Retrieved from the Internet <URL:https://cloud.tencent.com/developer/article/1847895> *
RALPH: "How to retrieve referenced work items in standard Polarion Widgets?", pages 1, Retrieved from the Internet <URL:https://community.sw.siemens.com/s/question/0D54O00007KQLOgSAP/how-to-retrieve-referenced-work-items-in-standard-polarion-widgets> *
王馨雨: "业务日志收集系统Agent Smith的设计与实现", 中国优秀硕士学位论文全文数据库 信息科技辑, no. 4, pages 138 - 299 *
耿荣: "EDA虚拟仿真实验系统的设计与实现", 中国优秀硕士学位论文全文数据库 信息科技辑, no. 9, pages 135 - 142 *
阿里云存储: "Electronic Design Automation (EDA) 数据上云解决方案", pages 1, Retrieved from the Internet <URL:https://developer.aliyun.com/article/883862> *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117112618A (en) * 2023-10-25 2023-11-24 上海合见工业软件集团有限公司 EDA software data query method, electronic device and medium
CN117112618B (en) * 2023-10-25 2024-01-26 上海合见工业软件集团有限公司 EDA software data query method, electronic device and medium

Also Published As

Publication number Publication date
CN116383155B (en) 2023-08-11

Similar Documents

Publication Publication Date Title
CN101872349B (en) Method and device for treating natural language problem
Hayes et al. Advancing candidate link generation for requirements tracing: The study of methods
CN106202514A (en) Accident based on Agent is across the search method of media information and system
CN111178027A (en) Report generation system and method based on online creation template and online specified data
US20130086556A1 (en) System for ensuring comprehensiveness of requirements testing of software applications
CN110968695A (en) Intelligent labeling method, device and platform based on active learning of weak supervision technology
CN109524070B (en) Data processing method and device, electronic equipment and storage medium
CN116383155B (en) Log query system based on EDA verification simulator
CN107016501A (en) A kind of efficient industrial big data multidimensional analysis method
Pettinato et al. Log mining to re-construct system behavior: An exploratory study on a large telescope system
CN111767334A (en) Information extraction method and device, electronic equipment and storage medium
Garcia et al. A Requirements-to-Implementation Mapping Tool for Requirements Traceability.
CN114356967A (en) Professional information collection and analysis application platform
CN114090463A (en) Customizable software test analysis evaluation system based on natural language processing technology
US20180232215A1 (en) Method and system for extracting concepts from research publications to identify necessary source code for implementation
CN117436440A (en) Log identification method, system, terminal equipment and storage medium
Borg et al. Analyzing networks of issue reports
CN114237588A (en) Code warehouse selection method, device, equipment and storage medium
CN112860899A (en) Label generation method and device, computer equipment and computer readable storage medium
CN112380264A (en) Policy analysis and matching method and device based on personal full life cycle
CN111767222A (en) Data model verification method and device, electronic equipment and storage medium
CN111179010A (en) Online notarization method, system, device and medium for unreasonable price products
Yang et al. On Code Reuse from StackOverflow: An Exploratory Study on Jupyter Notebook
CN112346958A (en) Quality control method for collaborative crowdsourcing test
CN109299381B (en) Software defect retrieval and analysis system and method based on semantic concept

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant