Microprocessor pipelining is a well-established technique that improves performance and reduces power consumption by overlapping instruction execution. Verifying, however, that an implementation meets this ISA specification is complex and time-consuming. One of the key verification issues that must be addressed is that of overlapping instruction execution. This can introduce hazards where, for instance, a new instruction reads the value from a register which will be written by an earlier instruction that has not yet completed. Using Event-B’s support for refinement with automated proof, a method is explored where the abstract machine represents directly an instruction from the ISA that specifies the effect that the instruction has on the mi...
The instruction set architecture (ISA) specifies a contract between hardware and software; it covers...
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5970511&tag=1Microarchitectural refinements are...
The study undertaken in this thesis tries to tackle this inefficiency by having extra register locat...
AbstractWe present a method for pipeline verification using SMT solvers. It is based on a non-determ...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
In microprocessors, achieving an efficient utilization of the execution units is a key factor in imp...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
technical reportWe present a systematic approach to decompose and incrementally build the proof of c...
Subject of this thesis is the formal verification of pipelined microprocessors. This includes proces...
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Modern System-on-chip (SoC) hardware design puts considerable pressure on existing design and verifi...
The paper presents a sequence of three projects on design and formal verification of pipelined and s...
Simulation-based techniques play a key role in validating the func-tional correctness of microproces...
AbstractThe refinement of an implementation-independent specification of an instruction set to a sim...
Abstract—Simulation-based techniques play a key role in validating the functional correctness of mic...
The instruction set architecture (ISA) specifies a contract between hardware and software; it covers...
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5970511&tag=1Microarchitectural refinements are...
The study undertaken in this thesis tries to tackle this inefficiency by having extra register locat...
AbstractWe present a method for pipeline verification using SMT solvers. It is based on a non-determ...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
In microprocessors, achieving an efficient utilization of the execution units is a key factor in imp...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
technical reportWe present a systematic approach to decompose and incrementally build the proof of c...
Subject of this thesis is the formal verification of pipelined microprocessors. This includes proces...
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Modern System-on-chip (SoC) hardware design puts considerable pressure on existing design and verifi...
The paper presents a sequence of three projects on design and formal verification of pipelined and s...
Simulation-based techniques play a key role in validating the func-tional correctness of microproces...
AbstractThe refinement of an implementation-independent specification of an instruction set to a sim...
Abstract—Simulation-based techniques play a key role in validating the functional correctness of mic...
The instruction set architecture (ISA) specifies a contract between hardware and software; it covers...
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5970511&tag=1Microarchitectural refinements are...
The study undertaken in this thesis tries to tackle this inefficiency by having extra register locat...