Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation. While the simulation data is inherently incomplete, it is necessary to evaluate the truth values of the mined assertions. This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios. A Belief-failRate metric is proposed to predict the truth/falseness of generated assertions. By considering both the occurrences of free variable assignments and the conflicts of absent scenarios, we use the metric to sort true assertions in higher ranking and false assertions in lower ranking. Our Belief-failRate guided assertion constraining method leverages the quality of generated asse...
This work focuses on the use of functional qualification for measuring the quality of co-verificatio...
To ensure that the design of a hardware system or protocol works according to specification, either ...
Design simulation and model checking are two alterna-tive and complementary techniques for verifying...
Several approaches exist for specification mining of hardware designs, both at the RTL and system le...
In this paper the behavior of assertion-based error detection mechanisms is characterized under faul...
We present GoldMine, a methodology for generating assertions automatically. Our method involves a co...
International audienceApproximate Computing (AxC) aims at optimizing the hardware resources in terms...
Exhaustive state space exploration based verification of embedded system designs remains a challenge...
Behavioral hardware descriptions are commonly used to represent the functionality of a microelectron...
The process of measuring the quality of a fault model is a key ingredient for implementing effective...
Bug-fixing in deeply embedded portions of the logic is typically accompanied by the post-facto addit...
The widespread use of hardware/software systems in cost-critical and life-critical applications moti...
Functional verification continues to be one of the most time-consuming steps in the chip design cycl...
Abstract—In the past decade, formal tools have increased functional verification efficiency by searc...
Abstract—Formal verification has increased efficiency by detecting corner case design bugs but it ha...
This work focuses on the use of functional qualification for measuring the quality of co-verificatio...
To ensure that the design of a hardware system or protocol works according to specification, either ...
Design simulation and model checking are two alterna-tive and complementary techniques for verifying...
Several approaches exist for specification mining of hardware designs, both at the RTL and system le...
In this paper the behavior of assertion-based error detection mechanisms is characterized under faul...
We present GoldMine, a methodology for generating assertions automatically. Our method involves a co...
International audienceApproximate Computing (AxC) aims at optimizing the hardware resources in terms...
Exhaustive state space exploration based verification of embedded system designs remains a challenge...
Behavioral hardware descriptions are commonly used to represent the functionality of a microelectron...
The process of measuring the quality of a fault model is a key ingredient for implementing effective...
Bug-fixing in deeply embedded portions of the logic is typically accompanied by the post-facto addit...
The widespread use of hardware/software systems in cost-critical and life-critical applications moti...
Functional verification continues to be one of the most time-consuming steps in the chip design cycl...
Abstract—In the past decade, formal tools have increased functional verification efficiency by searc...
Abstract—Formal verification has increased efficiency by detecting corner case design bugs but it ha...
This work focuses on the use of functional qualification for measuring the quality of co-verificatio...
To ensure that the design of a hardware system or protocol works according to specification, either ...
Design simulation and model checking are two alterna-tive and complementary techniques for verifying...