With the maturing of computer-aided verification technology, there is an emerging opportunity to develop design tools that can transform the way systems are designed. In this paper, we propose a new way to specify protocols using concolic snippets, that is, sample execution fragments that contain both concrete and symbolic values. While the purely symbolic extreme is simply an alternative representation of the traditional communicating extended finite-state-machines, and the purely concrete extreme is an instantiation of the programming by examples paradigm, our specification language allows the designer to specify the desired protocol using a mixture of symbolic state machines and concrete scenarios. Our synthesis engine generalizes the ...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
We propose a twophase ImperativeDirective design methodology for designing cache coherence protocols...
This paper presents a case study for automatic verifi-cation using the Communicating Sequential Proc...
With the maturing of computer-aided verification technology, there is an emerging opportunity to dev...
There are few published examples of the proof of correctness of a cache-coherence protocol expressed...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
Computer architects have often used trace-driven simulations to evaluate the performance of new arch...
Abstract. Scenarios, or Message Sequence Charts, offer an intuitive way of describing the desired be...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
We specify a cache coherence protocol for cache-only shared memory multiprocessor architectures usin...
. We address the problem of developing efficient cache coherence protocols implementing distributed ...
We propose a two-phase Imperative-Directive design methodology for designing cache coherence protoco...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
We propose a twophase ImperativeDirective design methodology for designing cache coherence protocols...
This paper presents a case study for automatic verifi-cation using the Communicating Sequential Proc...
With the maturing of computer-aided verification technology, there is an emerging opportunity to dev...
There are few published examples of the proof of correctness of a cache-coherence protocol expressed...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
Computer architects have often used trace-driven simulations to evaluate the performance of new arch...
Abstract. Scenarios, or Message Sequence Charts, offer an intuitive way of describing the desired be...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
We specify a cache coherence protocol for cache-only shared memory multiprocessor architectures usin...
. We address the problem of developing efficient cache coherence protocols implementing distributed ...
We propose a two-phase Imperative-Directive design methodology for designing cache coherence protoco...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
We propose a twophase ImperativeDirective design methodology for designing cache coherence protocols...
This paper presents a case study for automatic verifi-cation using the Communicating Sequential Proc...