This paper makes the idea of memory shadowing (Bryant and Velev, 1997) applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill's (1994) pipeline verification method to the bit level, is a technique for providing on-the-fly identical initial memory state to two different memory execution sequences. We also present an algorithm which compares the final states of two memories for ternary correspondence, as well as an approach for generating efficiently the initial state of memories. These techniques allow us to verify that a pipelined circuit has behavior corresponding to that of its unpipelined specification by simulating two symbolic ternary execution sequences and comparing their memory states. Experimen...
this paper, we call it the symbolic execution method. The symbolic execution method is highly automa...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory ...
Abstract. This paper extends Burch and Dill’s pipeline verification method [4] to the bit level. We ...
We present a way to abstract functional units in symbolic simulation of actual circuits, thus achiev...
We present a way to abstract functional units in symbolic simulation of actual circuits, thus achie...
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory...
Ternary system modeling involves extending the traditional set of binary values {01} with a third va...
A logic simulator can prove the correctness of a digital circuit when it can be shown that only circ...
A logic simulator can prove the correctness of a digital circuit if it can be shown that only circui...
We propose a novel encoding called guard-value encoding for the ternary domain {0, 1, X}. Among the ...
This paper enables symbolic simulation of systems with large embedded memories. Each memory array is...
The program MOSSYM simulates the behavior of a MOS circuit represented as a switch-level network sym...
Symbolic trajectory evaluation is a new approach to formal hardware verification combining the cir...
this paper, we call it the symbolic execution method. The symbolic execution method is highly automa...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory ...
Abstract. This paper extends Burch and Dill’s pipeline verification method [4] to the bit level. We ...
We present a way to abstract functional units in symbolic simulation of actual circuits, thus achiev...
We present a way to abstract functional units in symbolic simulation of actual circuits, thus achie...
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory...
Ternary system modeling involves extending the traditional set of binary values {01} with a third va...
A logic simulator can prove the correctness of a digital circuit when it can be shown that only circ...
A logic simulator can prove the correctness of a digital circuit if it can be shown that only circui...
We propose a novel encoding called guard-value encoding for the ternary domain {0, 1, X}. Among the ...
This paper enables symbolic simulation of systems with large embedded memories. Each memory array is...
The program MOSSYM simulates the behavior of a MOS circuit represented as a switch-level network sym...
Symbolic trajectory evaluation is a new approach to formal hardware verification combining the cir...
this paper, we call it the symbolic execution method. The symbolic execution method is highly automa...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
Symbolic trajectory evaluation (STE) is a model checking technique that has been successfully used t...