{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:07:06Z","timestamp":1748750826186,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319262864"},{"type":"electronic","value":"9783319262871"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26287-1_4","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T05:44:58Z","timestamp":1445838298000},"page":"51-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Verification Cockpit \u2013 Creating the Dream Playground for Data Analytics over the Verification Process"],"prefix":"10.1007","author":[{"given":"Moab","family":"Arar","sequence":"first","affiliation":[]},{"given":"Michael","family":"Behm","sequence":"additional","affiliation":[]},{"given":"Odellia","family":"Boni","sequence":"additional","affiliation":[]},{"given":"Raviv","family":"Gal","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Goldin","sequence":"additional","affiliation":[]},{"given":"Maxim","family":"Ilyaev","sequence":"additional","affiliation":[]},{"given":"Einat","family":"Kermany","sequence":"additional","affiliation":[]},{"given":"John","family":"Reysa","sequence":"additional","affiliation":[]},{"given":"Bilal","family":"Saleh","sequence":"additional","affiliation":[]},{"given":"Klaus-Dieter","family":"Schubert","sequence":"additional","affiliation":[]},{"given":"Gil","family":"Shurek","sequence":"additional","affiliation":[]},{"given":"Avi","family":"Ziv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"issue":"11","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1109\/TC.2006.173","volume":"55","author":"H Azatchi","year":"2006","unstructured":"Azatchi, H., Fournier, L., Marcus, E., Ur, S., Ziv, A., Zohar, K.: Advanced analysis techniques for cross-product coverage. IEEE Trans. Comput. 55(11), 1367\u20131379 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-34188-5_17","volume-title":"Hardware and Software: Verification and Testing","author":"A Birnbaum","year":"2012","unstructured":"Birnbaum, A., Fournier, L., Mittermaier, S., Ziv, A.: Reverse coverage analysis. In: Eder, K., Louren\u00e7o, J., Shehory, O. (eds.) HVC 2011. LNCS, vol. 7261, pp. 190\u2013202. Springer, Heidelberg (2012)"},{"key":"4_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38152-7","volume-title":"Metric Driven Design Verification: An Engineer\u2019s and Executive\u2019s Guide to First Pass Success","author":"HB Carter","year":"2007","unstructured":"Carter, H.B., Hemmady, S.G.: Metric Driven Design Verification: An Engineer\u2019s and Executive\u2019s Guide to First Pass Success. Springer, New York (2007)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, L.C., Bhadra, J., Abadir, M.: Simulation knowledge extraction and reuse in constrained random processor verification. In: Proceedings of the 50th Annual Design Automation Conference, DAC 2013, pp. 120:1\u2013120:6, June 2013","DOI":"10.1145\/2463209.2488881"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.tcs.2008.03.020","volume":"404","author":"S Copty","year":"2008","unstructured":"Copty, S., Fine, S., Ur, S., Yom-Tov, E., Ziv, A.: A probabilistic alternative to regression suites. Theor. Comput. Sci. 404(3), 219\u2013234 (2008)","journal-title":"Theor. Comput. Sci."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Farkash, M., Hickerson, B., Behm, M.: Coverage learned targeted validation for incremental HW changes. In: Proceedings of the 51st Annual Design Automation Conference on Design Automation Conference, pp. 57:1\u201357:6, June 2014","DOI":"10.1145\/2593069.2593114"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Fine, S., Ziv, A.: Coverage directed test generation for functional verification using Bayesian networks. In: Proceedings of the 40th Design Automation Conference, pp. 286\u2013291, June 2003","DOI":"10.1145\/775905.775907"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TCAD.2013.2288688","volume":"33","author":"Q Guo","year":"2014","unstructured":"Guo, Q., Chen, T., Chen, Y., Wang, R., Chen, H., Hu, W., Chen, G.: Pre-silicon bug forecast. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(3), 451\u2013463 (2014)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Hajjar, A., Chen, T., Munn, I., Andrews, A., Bjorkman, M.: High quality behavioral verification using statistical stopping criteria. In: Proceedings of the 2001 Design, Automation and Test in Europe Conference, pp. 411\u2013418, March 2001","DOI":"10.1109\/DATE.2001.915057"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-19583-9_13","volume-title":"Hardware and Software: Verification and Testing","author":"C Ioannides","year":"2010","unstructured":"Ioannides, C., Barrett, G., Eder, K.: Feedback-based coverage directed test generation: an industrial evaluation. In: Barner, S., Harris, I., Kroening, D., Raz, O. (eds.) HVC 2010. LNCS, vol. 6504, pp. 112\u2013128. Springer, Heidelberg (2010)"},{"key":"4_CR11","volume-title":"Big Data: Principles and Best Practices of Scalable Realtime Data Systems","author":"N Marz","year":"2015","unstructured":"Marz, N., Warren, J.: Big Data: Principles and Best Practices of Scalable Realtime Data Systems. Manning Publications, Westampton (2015)"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470604137","volume-title":"Data Warehousing Fundamentals for IT Professionals","author":"P Ponniah","year":"2010","unstructured":"Ponniah, P.: Data Warehousing Fundamentals for IT Professionals, 2nd edn. Wiley, Hoboken (2010)","edition":"2"},{"key":"4_CR13","volume-title":"Data Analytics - Models and Algorithms for Intelligent Data Analysis","author":"TA Runkler","year":"2012","unstructured":"Runkler, T.A.: Data Analytics - Models and Algorithms for Intelligent Data Analysis. Springer, Wiesbaden (2012)"},{"key":"4_CR14","volume-title":"Product Lifecycle Management","author":"A Saaksvuori","year":"2010","unstructured":"Saaksvuori, A., Immonen, A.: Product Lifecycle Management, 3rd edn. Springer, Heidelberg (2010)","edition":"3"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1147\/JRD.2014.2380271","volume":"59","author":"KD Schubert","year":"2015","unstructured":"Schubert, K.D., et al.: Solutions to IBM POWER8 verification challenges. IBM J. Res. Dev. 59(1), 1\u201317 (2015)","journal-title":"IBM J. Res. Dev."},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1147\/JRD.2011.2117370","volume":"55","author":"KD Schubert","year":"2011","unstructured":"Schubert, K.D., et al.: Functional verification of the IBM POWER7 microprocessor and POWER7 multiprocessor systems. IBM J. Res. Dev. 55(3), 308\u2013324 (2011)","journal-title":"IBM J. Res. Dev."},{"key":"4_CR17","unstructured":"Wikipedia: Data analysis \u2013 Wikipedia, the free encyclopedia (2014). http:\/\/en.wikipedia.org\/wiki\/Data_analysis . Accessed 29 October 2014"},{"key":"4_CR18","unstructured":"Incisive enterprise manager. http:\/\/www.cadence.com\/products\/sd\/enterprise_manager\/pages\/default.aspx . Accessed 19 July 2015"},{"key":"4_CR19","unstructured":"Questa verification management. http:\/\/www.mentor.com\/products\/fv\/questa-verification-management\/ . Accessed 19 July 2015"},{"key":"4_CR20","unstructured":"VCS. http:\/\/www.synopsys.com\/Tools\/Verification\/FunctionalVerification\/Pages\/VCS.aspx . Accessed 19 July 2015"},{"key":"4_CR21","unstructured":"IBM - rational insight. http:\/\/www-03.ibm.com\/software\/products\/en\/rtl-insight . Accessed 21 July 2015"},{"key":"4_CR22","unstructured":"The people, places, history, and ideas behind Jazz. https:\/\/jazz.net\/story\/about\/ . Accessed 19 July 2015"},{"key":"4_CR23","unstructured":"What is OSLC? http:\/\/open-services.net\/resources\/tutorials\/oslc-primer\/what-is-oslc\/ . Accessed 19 July 2015"},{"key":"4_CR24","unstructured":"Unified coverage interoperability standard (UCIS). http:\/\/accellera.org\/images\/downloads\/standards\/ucis\/UCIS_Version_1.0_Final_June-2012.pdf . Accessed 19 July 2015"}],"container-title":["Lecture Notes in Computer Science","Hardware and Software: Verification and Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26287-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:13:38Z","timestamp":1748664818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26287-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319262864","9783319262871"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26287-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}