We describe a technique for verifying that a hardware design correctly implements a protocol-level formal specification. Simulation steps are translated to protocol state transitions using a refinement map and then verified against the spec-ification using a model checker. On the specification state space, the model checker collects coverage information and identifies states violating certain properties. It then gener-ates protocol-level traces to these coverage gaps and error states. This technique was applied to the multiprocessing hardware of the Alpha 21364 microprocessor and the cache coherence protocol. We were able to generate an error trace which exercised a bug in the implementation that had not been discovered before a prototype w...
Behavioral hardware descriptions are commonly used to represent the functionality of a microelectron...
We introduce SImulation Verification with Augmentation (SIVA), a tool for checking safety properties...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...
We describe a technique for verifying that a hardware design correctly implements a protocol-level f...
We describe a technique for verifying that a hardware design correctly implements a protocol. The ap...
Many approaches have been proposed for digital system verification, either based on simulation strat...
Computer architects have often used trace-driven simulations to evaluate the performance of new arch...
Digital's Alpha-based DECchip 21164 processor was verified extensively prior to fabrication of ...
Digital's Alpha-based DECchip 21 164 processor was verified extensively prior to fabrication of...
In the age of submicron technology a single chip may contain tens or even hundreds of millions trans...
As real-time and safety-critical computer systems become more prevalent, increasing attention has be...
International audienceIn this paper we report about a case study on the functional verification of a...
We present an automated formal verification method that can detect common pipeline-control bugs of l...
Designs of hardware and software systems have grown in complexity to meet the demand for improved pe...
A single node of a modern scalable multiprocessor consists of several ASICs comprising tens of milli...
Behavioral hardware descriptions are commonly used to represent the functionality of a microelectron...
We introduce SImulation Verification with Augmentation (SIVA), a tool for checking safety properties...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...
We describe a technique for verifying that a hardware design correctly implements a protocol-level f...
We describe a technique for verifying that a hardware design correctly implements a protocol. The ap...
Many approaches have been proposed for digital system verification, either based on simulation strat...
Computer architects have often used trace-driven simulations to evaluate the performance of new arch...
Digital's Alpha-based DECchip 21164 processor was verified extensively prior to fabrication of ...
Digital's Alpha-based DECchip 21 164 processor was verified extensively prior to fabrication of...
In the age of submicron technology a single chip may contain tens or even hundreds of millions trans...
As real-time and safety-critical computer systems become more prevalent, increasing attention has be...
International audienceIn this paper we report about a case study on the functional verification of a...
We present an automated formal verification method that can detect common pipeline-control bugs of l...
Designs of hardware and software systems have grown in complexity to meet the demand for improved pe...
A single node of a modern scalable multiprocessor consists of several ASICs comprising tens of milli...
Behavioral hardware descriptions are commonly used to represent the functionality of a microelectron...
We introduce SImulation Verification with Augmentation (SIVA), a tool for checking safety properties...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...