• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,120
Next 10 →

Automated Formal Verification of Processors Based on Architectural Models

by Ulrich Kühne, Sven Beyer, Jörg Bormann, John Barstow
"... Abstract— To keep up with the growing complexity of digital systems, high level models are used in the design process. In today’s processor design, a comprehensive tool chain can be built automatically from architectural or transaction level models, but disregarding formal verification. We present a ..."
Abstract - Add to MetaCart
Abstract— To keep up with the growing complexity of digital systems, high level models are used in the design process. In today’s processor design, a comprehensive tool chain can be built automatically from architectural or transaction level models, but disregarding formal verification. We present

VIATRA - Visual Automated Transformations for Formal Verification and Validation of UML Models

by Gyorgy Csertan, Gabor Huszerl, Istvan Majzik, Zsigmond Pap, Andras Pataricza, Daniel Varro, Dániel Varró , 2002
"... The VIATRA (VIsual Automated model TRAnsformations) framework is the core of a transformation-based verification and validation environment for improving the quality of systems designed using the Unified Modeling Language by automatically checking consistency, completeness, and dependability require ..."
Abstract - Cited by 65 (6 self) - Add to MetaCart
The VIATRA (VIsual Automated model TRAnsformations) framework is the core of a transformation-based verification and validation environment for improving the quality of systems designed using the Unified Modeling Language by automatically checking consistency, completeness, and dependability

A Practical Methodology for the Formal Verification of RISC Processors

by Sofiène Tahar, Ramayya Kumar , 1995
"... In this paper a practical methodology for formally verifying RISC cores is presented. This methodology is based on a hierarchical model of interpreters which reflects the abstraction levels used by a designer in the implementation of RISC cores, namely the architecture level, the pipeline stage leve ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
In this paper a practical methodology for formally verifying RISC cores is presented. This methodology is based on a hierarchical model of interpreters which reflects the abstraction levels used by a designer in the implementation of RISC cores, namely the architecture level, the pipeline stage

Automating formal verification of customized soft-processors

by Kong Woei Susanto, Wayne Luk - in FPT. IEEE
"... Abstract—Soft–processors, instructionprocessors implemented in FPGA technology, are often customizable to support domainspecificoptimization.However thecorrectness ofcustomizedsoft– processors, executing the associated machine code, is often not obvious. This paper proposes a novel approach for veri ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
for verifying the implementation of an application program for a customized soft– processor, based on the ACL2 theorem prover. The correctness proof involves verifying a machine code program executing on the target hardware device against a high-level specification of the application program. We illustrate

Model Based Test Generation for Processor Verification

by Yossi Lichtenstein, Yossi Malka, Aharon Aharon
"... A few simple Expert-System techniques have been invaluable in developing a new test program generator for design verification of hardware processors. The new generator uses a formal declarative model of the processor architecture; it allows generation of test programs for a variety of processo ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
A few simple Expert-System techniques have been invaluable in developing a new test program generator for design verification of hardware processors. The new generator uses a formal declarative model of the processor architecture; it allows generation of test programs for a variety

Automated Formal Verification of Model Tranformations

by Dániel Varró, Andras Pataricza
"... As the Model Driven Architecture (MDA) relies on complex and highly automated model transformations between arbitrary modeling languages, the quality of such transformations is of immense importance as it can easily become a bottleneck of a model-driven design process. Automation surely increases ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
As the Model Driven Architecture (MDA) relies on complex and highly automated model transformations between arbitrary modeling languages, the quality of such transformations is of immense importance as it can easily become a bottleneck of a model-driven design process. Automation surely increases

Automated Generation of Processor Architectures in . . .

by Maxim Rykunov, Andrey Mokhov, Alex Yakovlev, Albert Koelmans , 2010
"... Automated design of processor architectures has traditionally been focused on the clocked pipeline organisation consisting of a fairly standard datapath and control logic. Control logic has been normally generated from the architectural description of a processor using the conventional techniques ba ..."
Abstract - Add to MetaCart
based on Finite State Machines (FSMs). As the area of processor design automation is becoming increasingly inclusive of system paradigms that are heterogeneous in terms of timing, such as multiclock and asynchronous circuits, there is a need for appropriate models and associated synthesis algorithms

Automatic formal verification of fused-multiply-add FPUs

by Christian Jacobi, Kai Weber, Viresh Paruthi, Jason Baumgartner - IN DATE , 2005
"... In this paper we describe a fully-automated methodology for formal verification of fused-multiply-add floating point units (FPUs). Our methodology verifies an implementation FPU against a simple reference model derived from the processor’s architectural specification, which may include all aspects o ..."
Abstract - Cited by 16 (6 self) - Add to MetaCart
In this paper we describe a fully-automated methodology for formal verification of fused-multiply-add floating point units (FPUs). Our methodology verifies an implementation FPU against a simple reference model derived from the processor’s architectural specification, which may include all aspects

Towards Automated Formal Verification of Visual Modeling Languages by Model Checking

by Dániel Varró , 2003
"... Graph transformation has recently become more and more popular as a general, rule-based visual specification paradigm to formally capture (i) requirements or behavior of user models (on the model-level), and (ii) the operational semantics of modeling languages (on the meta-level) as demonstrated by ..."
Abstract - Cited by 50 (5 self) - Add to MetaCart
by benchmark applications around the Unified Modeling Language (UML). In the paper, we present a meta-level transformation technique to enable model checking-based symbolic verification for arbitrary well-formed models and modeling languages (with formal semantics defined by graph transformation systems

Formalization and Automated Verification of RESTful Behavior

by Uri Klein, Kedar S. Namjoshi
"... Abstract. REST is a software architectural style used for the design of highly scalable web applications. Interest in REST has grown rapidly over the past decade, spurred by the growth of open web APIs. On the other hand, there is also considerable confusion surrounding REST: many examples of suppos ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
of supposedly RESTful APIs violate key REST constraints. We show that the constraints of REST and of RESTful HTTP can be precisely formulated within temporal logic. This leads to methods for model checking and run-time verification of RESTful behavior. We formulate several relevant verification questions
Next 10 →
Results 1 - 10 of 1,120
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University