Verifying memory arrays such as on-chip caches and register files is a difficult part of designing a microprocessor. Current toolscannot verify the equivalence of the arrays to their behavioral or RTL models, nor their correct functioning at the transistor level. It is infeasible to run the number of simulation cycles required, and most formal verification tools breakdowndue to the enormous number of state-holding elements in the arrays. The formal method of symbolic trajectory evaluation (STE) appears to offer a solution, however. STE verifies that a circuit satisfies a formula in a carefully restricted temporal logic. For arrays, it requires only a number of variables approximately logarithmicin the numberof memory locations. The circu...
This paper enables symbolic simulation of systems with large embedded memories. Each memory array is...
Model checking by symbolic trajectory evaluation, orchestrated in a flexible functional-programming ...
Traditional methods of testing computer systems, although valuable, are inadequate for ensuring suff...
Verifying memory arrays such as on-chip caches and register files is a difficult part of designing a...
In this paper we report on new techniques for verifying content addressable memories (CAMs), and dem...
Symbolic trajectory evaluation (Seger and Bryant, 1995) or STE in short has been successfully used i...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
The rapid growth in hardware complexity has led to a need for formal verification of hardware design...
Abstract. Many modern systems are designed as a set of intercon-nected reactive subsystems. The subs...
This dissertation documents two contributions to automating the formal verification of hardware – pa...
Symbolic Trajectory Evaluation is an industrial-strength verification method, based on symbolic simu...
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory...
We describe the use of symmetry for verification of transistor-level circuits by symbolic trajectory...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
This paper enables symbolic simulation of systems with large embedded memories. Each memory array is...
Model checking by symbolic trajectory evaluation, orchestrated in a flexible functional-programming ...
Traditional methods of testing computer systems, although valuable, are inadequate for ensuring suff...
Verifying memory arrays such as on-chip caches and register files is a difficult part of designing a...
In this paper we report on new techniques for verifying content addressable memories (CAMs), and dem...
Symbolic trajectory evaluation (Seger and Bryant, 1995) or STE in short has been successfully used i...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
The rapid growth in hardware complexity has led to a need for formal verification of hardware design...
Abstract. Many modern systems are designed as a set of intercon-nected reactive subsystems. The subs...
This dissertation documents two contributions to automating the formal verification of hardware – pa...
Symbolic Trajectory Evaluation is an industrial-strength verification method, based on symbolic simu...
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory...
We describe the use of symmetry for verification of transistor-level circuits by symbolic trajectory...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
Symbolic trajectory evaluation (STE) is a model checking technology based on symbolic simulation ove...
This paper enables symbolic simulation of systems with large embedded memories. Each memory array is...
Model checking by symbolic trajectory evaluation, orchestrated in a flexible functional-programming ...
Traditional methods of testing computer systems, although valuable, are inadequate for ensuring suff...