Journal ArticleCorrect interaction of asynchronous hardware protocols requires verification. Performance and power of asynchronous hardware circuits and protocols can be vastly improved by modifying them with judicious application of timing constraints. A methodology is presented for verifying larger asynchronous protocols through compositional model checking with symbolic methods. This approach uses Relative timing constraints for modeling timed asynchronous hardware protocols and hence is generic for timed and untimed protocols. This paper illustrates the modeling technique for interleaving and simultaneous models with relative timing, which helps in pruning state space. Properties which are verified for ensuring correctness of composed ...
The relative timing (RT) based asynchronous design methodology has been successfully used to create ...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
Complex hardware systems become more and more ubiquitous in mission critical applications such as mi...
pre-printCorrect interaction of asynchronous protocols re- quires verification. Timed asynchronous p...
thesisThis thesis work provides a methodology and a tool fl ow for verifying asynchronous hardware ...
Abstract—Correct interaction of asynchronous protocols re-quires verification. Timed asynchronous pr...
The verification of a n-stage pulse-driven IPCMOS pipeline, for any n>0, is presented. The complexit...
We propose a novel technique for modeling and verify-ing timed circuits based on the notion of gener...
Journal ArticleThis paper presents a new approach for synthesis and verification of asynchronous cir...
The incorporation of timing makes circuit verification computationally expensive. This paper propose...
AbstractIn this work we apply the timing verification tool OpenKronos, which is based on timed autom...
Verifying timed circuits is a complex problem even when the delays of the system are fixed. This pap...
Journal ArticleAbstract-Recent design examples have shown that significant performance gains are rea...
International audienceAsynchronous circuits have key advantages in terms of low energy consumption, ...
The self-timed (or asynchronous) approach to circuit design has demonstrated benefits in a number of...
The relative timing (RT) based asynchronous design methodology has been successfully used to create ...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
Complex hardware systems become more and more ubiquitous in mission critical applications such as mi...
pre-printCorrect interaction of asynchronous protocols re- quires verification. Timed asynchronous p...
thesisThis thesis work provides a methodology and a tool fl ow for verifying asynchronous hardware ...
Abstract—Correct interaction of asynchronous protocols re-quires verification. Timed asynchronous pr...
The verification of a n-stage pulse-driven IPCMOS pipeline, for any n>0, is presented. The complexit...
We propose a novel technique for modeling and verify-ing timed circuits based on the notion of gener...
Journal ArticleThis paper presents a new approach for synthesis and verification of asynchronous cir...
The incorporation of timing makes circuit verification computationally expensive. This paper propose...
AbstractIn this work we apply the timing verification tool OpenKronos, which is based on timed autom...
Verifying timed circuits is a complex problem even when the delays of the system are fixed. This pap...
Journal ArticleAbstract-Recent design examples have shown that significant performance gains are rea...
International audienceAsynchronous circuits have key advantages in terms of low energy consumption, ...
The self-timed (or asynchronous) approach to circuit design has demonstrated benefits in a number of...
The relative timing (RT) based asynchronous design methodology has been successfully used to create ...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
Complex hardware systems become more and more ubiquitous in mission critical applications such as mi...