This paper presents functional coverage analysis automation and an approach to scale down ... we have taken a specific example of verification of USB Host and Device controller IP Cores.
Some results have been hidden because they may be inaccessible to you