. We present a new approach to the verification of hardware systems with data dependencies using temporal logic symbolic model checking. As a benchmark we take Tomasulo's algorithm [10] for out-of-order instruction scheduling. Our approach is similar to the idea of uninterpreted function symbols [4]. We use symbolic values and instructions instead of concrete ones. This allows us to show the correctness of the machine independently of the actual instruction set architecture and the implementation of the functional units. Instead of using first order terms as in [4], we represent symbolic values with a new compact encoding. In addition, we apply some other reduction techniques to the model. This significantly reduces the state space and...
Formal verification of hardware and software systems has long been recognized as an essential step i...
Symbolic model checking is a powerful formal-verification technique for reactive systems. In this pa...
Modern software systems, which often are concurrent and manipulate complex data structures must be ...
Abstract. We present a new approach to the verification of hardware systems with data dependencies u...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
AbstractThe design of correct computer systems is extremely difficult. However, it is also a very im...
In hardware verification, the introduction of symbolic model checking has been considered a break-th...
Symbolic model checking is a successful technique for checking properties of large finite-state syst...
International audienceThe successful application of model-checking to industrial designs calls for a...
International audienceWe study the problem of model checking software product line (SPL) behaviours ...
ISBN: 076951944XThe successful application of model-checking to industrial designs requires methods ...
Abstract. There is a large class of circuits (including pipeline and outof-order execution component...
Julkaistu vain painettuna, saatavuus katso Bibid. Published only in printed form, availability see B...
In this paper, we study the application of propositional deci-sion procedures in hardware verificati...
The temporal logic model algorithm of E.M. Clarke et al. (ACM Trans. Prog. Lang. Syst., vol.8, no.2...
Formal verification of hardware and software systems has long been recognized as an essential step i...
Symbolic model checking is a powerful formal-verification technique for reactive systems. In this pa...
Modern software systems, which often are concurrent and manipulate complex data structures must be ...
Abstract. We present a new approach to the verification of hardware systems with data dependencies u...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
AbstractThe design of correct computer systems is extremely difficult. However, it is also a very im...
In hardware verification, the introduction of symbolic model checking has been considered a break-th...
Symbolic model checking is a successful technique for checking properties of large finite-state syst...
International audienceThe successful application of model-checking to industrial designs calls for a...
International audienceWe study the problem of model checking software product line (SPL) behaviours ...
ISBN: 076951944XThe successful application of model-checking to industrial designs requires methods ...
Abstract. There is a large class of circuits (including pipeline and outof-order execution component...
Julkaistu vain painettuna, saatavuus katso Bibid. Published only in printed form, availability see B...
In this paper, we study the application of propositional deci-sion procedures in hardware verificati...
The temporal logic model algorithm of E.M. Clarke et al. (ACM Trans. Prog. Lang. Syst., vol.8, no.2...
Formal verification of hardware and software systems has long been recognized as an essential step i...
Symbolic model checking is a powerful formal-verification technique for reactive systems. In this pa...
Modern software systems, which often are concurrent and manipulate complex data structures must be ...