With the maturing of computer-aided verification technology, there is an emerging opportunity to develop design tools that can transform the way systems are designed. In this paper, we propose a new way to specify protocols using concolic snippets, that is, sample execution fragments that contain both concrete and symbolic values. While the purely symbolic extreme is simply an alternative representation of the traditional communicating extended finite-state-machines, and the purely concrete extreme is an instantiation of the programming by examples paradigm, our specification language allows the designer to specify the desired protocol using a mixture of symbolic state machines and concrete scenarios. Our synthesis engine generalizes the ...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
. We address the problem of developing efficient cache coherence protocols implementing distributed ...
We combine compositional reasoning and reachability analysis to formally verify the safety of a rece...
With the maturing of computer-aided verification technology, there is an emerging opportunity to dev...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
technical reportModern chip multiprocessor (CMP) cache coherence protocols are extremely complex an...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...
There are few published examples of the proof of correctness of a cache-coherence protocol expressed...
technical reportThe need to formally verify hardware and software systems before they are deployed t...
technical reportWe address the problem of developing efficient cache coherence protocols for use in ...
<p>The correctness of a cache coherence protocol is crucial to the system since a subtle bug in the ...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
Abstract. Scenarios, or Message Sequence Charts, offer an intuitive way of describing the desired be...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
Computer architects have often used trace-driven simulations to evaluate the performance of new arch...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
. We address the problem of developing efficient cache coherence protocols implementing distributed ...
We combine compositional reasoning and reachability analysis to formally verify the safety of a rece...
With the maturing of computer-aided verification technology, there is an emerging opportunity to dev...
In this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols....
technical reportModern chip multiprocessor (CMP) cache coherence protocols are extremely complex an...
To reduce problems encountered in the later phases of the software life cycle, verification techniq...
There are few published examples of the proof of correctness of a cache-coherence protocol expressed...
technical reportThe need to formally verify hardware and software systems before they are deployed t...
technical reportWe address the problem of developing efficient cache coherence protocols for use in ...
<p>The correctness of a cache coherence protocol is crucial to the system since a subtle bug in the ...
In this paper we describe our experience with Teapot [7], a domain-specific language for writing cac...
Abstract. Scenarios, or Message Sequence Charts, offer an intuitive way of describing the desired be...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
Computer architects have often used trace-driven simulations to evaluate the performance of new arch...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
. We address the problem of developing efficient cache coherence protocols implementing distributed ...
We combine compositional reasoning and reachability analysis to formally verify the safety of a rece...