Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The key is that the "formal verification" methods[0] the author is describing are still novel in the hardware industry, especially involving "human readable" ISA specifications and HDL's.

[0] https://embedded.eecs.berkeley.edu/research/vis/doc/VisUser/...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: