technical reportIndustrial cache coherence protocol models often have too many reachable states, preventing full reachability analysis even for small model instances (number of processors, addresses, etc.). Several partial search debugging methods are, therefore, employed, including lossy state compression using hash compaction, and bounded model checking (BMC, or equivalently, depth-bounded search). We show that instead of a BMC approach, a bounded transaction approach is much more effective for debugging. This is because of the fact that the basic unit of activity in a cache coherence protocol is that of a transaction - e.g., a complete causal cycle of actions beginning with a node making a request for a line and obtaining the lin...
This paper reports progress in verification tool engineering for weak memory models. We present two ...
technical reportIn explicit state (enumerative) model checking, state vectors are often represented ...
AbstractThis paper presents a software model checking algorithm that combats state explosion by deco...
Computers have brought us inestimable convenience in recent years. We have become dependent on them ...
technical reportModern chip multiprocessor (CMP) cache coherence protocols are extremely complex an...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
technical reportMany complex concurrent protocols that cannot be formally verified due to state expl...
Cache coherence must work. After years of theoretical research into flip-flop gates, we show the exp...
AbstractWe explore the use of distributed processing to enhance the performance of explicit state en...
AbstractIn Bounded Model Checking (BMC), the search for counterexamples of increasing lengths is tra...
This paper extends the piggyback algorithm to enlarge the set of liveness properties it can verify. ...
Model checking large concurrent systems is a difficult task, due to the infamous state space explosi...
This paper addresses the reachability problem for pushdown systems communicating via shared memory...
Modern multi-core microprocessors cannot function anymore without memory caches, in multiple layers,...
textConcurrency errors are notoriously difficult to debug because they may occur only under unexpect...
This paper reports progress in verification tool engineering for weak memory models. We present two ...
technical reportIn explicit state (enumerative) model checking, state vectors are often represented ...
AbstractThis paper presents a software model checking algorithm that combats state explosion by deco...
Computers have brought us inestimable convenience in recent years. We have become dependent on them ...
technical reportModern chip multiprocessor (CMP) cache coherence protocols are extremely complex an...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
technical reportMany complex concurrent protocols that cannot be formally verified due to state expl...
Cache coherence must work. After years of theoretical research into flip-flop gates, we show the exp...
AbstractWe explore the use of distributed processing to enhance the performance of explicit state en...
AbstractIn Bounded Model Checking (BMC), the search for counterexamples of increasing lengths is tra...
This paper extends the piggyback algorithm to enlarge the set of liveness properties it can verify. ...
Model checking large concurrent systems is a difficult task, due to the infamous state space explosi...
This paper addresses the reachability problem for pushdown systems communicating via shared memory...
Modern multi-core microprocessors cannot function anymore without memory caches, in multiple layers,...
textConcurrency errors are notoriously difficult to debug because they may occur only under unexpect...
This paper reports progress in verification tool engineering for weak memory models. We present two ...
technical reportIn explicit state (enumerative) model checking, state vectors are often represented ...
AbstractThis paper presents a software model checking algorithm that combats state explosion by deco...