This paper enables symbolic simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic vari-ables used to characterize the initial state of the memory is proportional to the number of mem-ory accesses. The memory state is represented by a list containing entries of the form 〈c, a, d〉, where c is a Boolean expression denoting the set of conditions for which the entry is defined, a is an address expression denoting a memory location, and d is a data expression denoting the con-tents of this location. Address and data expressions are represented as vectors of Boolean expressions. The list interacts with the rest of the circuit by means of a software interface devel-op...
ISBN 2-84813-069-5This PhD thesis presents a new symbolic simulation method for circuits described a...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
This dissertation documents two contributions to automating the formal verification of hardware – pa...
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory ...
Symbolic simulation involves evaluating circuit behavior using special symbolic values to encode a r...
Symbolic simulation is an important technique used informal property verification and test generatio...
Symbolic methods are often considered the state-of-the-art technique for validating digital circuits...
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
Verifying memory arrays such as on-chip caches and register files is a difficult part of designing a...
In this paper we report on new techniques for verifying content addressable memories (CAMs), and dem...
This paper describes the development of progressively more powerful and abstract hardware simulators...
The program MOSSYM simulates the behavior of a MOS circuit represented as a switch-level network sym...
Verifying memory arrays such as on-chip caches and register files is a difficult part of designing ...
ISBN 2-84813-069-5This PhD thesis presents a new symbolic simulation method for circuits described a...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
This dissertation documents two contributions to automating the formal verification of hardware – pa...
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory ...
Symbolic simulation involves evaluating circuit behavior using special symbolic values to encode a r...
Symbolic simulation is an important technique used informal property verification and test generatio...
Symbolic methods are often considered the state-of-the-art technique for validating digital circuits...
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
Verifying memory arrays such as on-chip caches and register files is a difficult part of designing a...
In this paper we report on new techniques for verifying content addressable memories (CAMs), and dem...
This paper describes the development of progressively more powerful and abstract hardware simulators...
The program MOSSYM simulates the behavior of a MOS circuit represented as a switch-level network sym...
Verifying memory arrays such as on-chip caches and register files is a difficult part of designing ...
ISBN 2-84813-069-5This PhD thesis presents a new symbolic simulation method for circuits described a...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
This dissertation documents two contributions to automating the formal verification of hardware – pa...