• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 120
Next 10 →

Proving the Correctness of Pipelined Micro-Architectures

by Daniel Kroening, Wolfgang J. Paul, Silvia M. Mueller - Proc. of the ITG/GI/GMM Workshop, (Ed K. Waldschmidt and C. Grimm), VDE Verlag , 2000
"... This paper presents how to generate the implementation of a pipelined microprocessor from an arbitrary sequential specification. All necessary forwarding and stalling logic is created automatically. The implementation is provided in the language of the theorem proving system (PVS). This implementati ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
This paper presents how to generate the implementation of a pipelined microprocessor from an arbitrary sequential specification. All necessary forwarding and stalling logic is created automatically. The implementation is provided in the language of the theorem proving system (PVS

DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design

by Todd M. Austin - In Proc. 32nd Annual Intl. Symp. on Microarchitecture , 1999
"... Building a high-petformance microprocessor presents many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that work reliably in varied (and occasionally adverse) operating conditions. To&rther complicate this task, deep submicro ..."
Abstract - Cited by 374 (15 self) - Add to MetaCart
of correctness in microprocessor designs. The approach works by augmenting the commit phase of the processor pipeline with a functional checker unit. Thefunctional checker verifies the correctness of the core processor’s computation, only permitting correct results to commit. Overall design cost can

Formal verification of the ARM6 micro-architecture

by Anthony Fox, Anthony Fox , 2002
"... This report describes the formal verification of the arm6 micro-architecture using the hol theorem prover. The correctness of the microprocessor design compares the micro-architecture with an abstract, target instruction set semantics. Data and temporal abstraction maps are used to formally relat ..."
Abstract - Cited by 8 (2 self) - Add to MetaCart
relate the state spaces and to capture the timing behaviour of the processor. The verification is carried out in hol and one-step theorems are used to provide the framework for the proof of correctness. This report also describes the formal specification of the arm6's three stage pipelined micro-architecture.

Correctness of Pipelined Machines

by Panagiotis Manolios - Formal Methods in Computer-Aided Design–FMCAD 2000, volume 1954 of LNCS
"... The correctness of pipelined machines is a subject that has been studied extensively. Most of the recent work has used variants of the Burch and Dill notion of correctness [4]. As new features are modeled, e.g., interrupts, new notions of correctness are developed. Given the plethora of correctness ..."
Abstract - Cited by 32 (13 self) - Add to MetaCart
]. Briey, our notion of correctness implies that the ISA (Instruction Set Architecture) and MA (Micro-Architecture) machines have the same observable in nite paths, up to stuttering. This implies that the two machines satisfy the same CTL* X properties and the same safety and liveness properties (up

Verifying Micro-Architecture Simulators using Event Traces

by Hui Meen, Nyew Nilufer, Onder Soner, Onder Zhenlin Wang
"... Contemporary micro-architecture research inherently relies on cycleaccurate simulators to test new ideas. Typical simulator implementations involve tens of thousands of lines of high-level code. Although general software engineering verification and validation techniques can be applied, the mere com ..."
Abstract - Add to MetaCart
Contemporary micro-architecture research inherently relies on cycleaccurate simulators to test new ideas. Typical simulator implementations involve tens of thousands of lines of high-level code. Although general software engineering verification and validation techniques can be applied, the mere

Counterflow Pipeline Processor Architecture

by Robert Sproull, Ivan E. Sutherland, Charles E. Molnar , 1994
"... : The counterflow pipeline processor architecture (cfpp) is a proposal for a family of microarchitectures for risc processors. The architecture derives its name from its fundamental feature, namely that instructions and results flow in opposite directions within a pipeline and interact as they pass. ..."
Abstract - Cited by 57 (0 self) - Add to MetaCart
: The counterflow pipeline processor architecture (cfpp) is a proposal for a family of microarchitectures for risc processors. The architecture derives its name from its fundamental feature, namely that instructions and results flow in opposite directions within a pipeline and interact as they pass

Proving the Correctness of a Complete Microprocessor

by Christian Jacobi, Daniel Kroening - In GI Jahrestagung 2000 , 2000
"... . This paper presents status results of a microprocessor verification project. The authors verify a complete 32-bit RISC microprocessor including the floating point unit and the control logic of the pipeline. The paper describes a formal definition of a "correct" microprocessor. This co ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
. This paper presents status results of a microprocessor verification project. The authors verify a complete 32-bit RISC microprocessor including the floating point unit and the control logic of the pipeline. The paper describes a formal definition of a "correct" microprocessor

Using Positive Equality to Prove Liveness for Pipelined Microprocessors

by Miroslav N. Velev - In Proc. Asia and South Pacific Design Automation Conference , 2004
"... Abstract—The paper presents an indirect method to automatically prove liveness for pipelined microprocessors. This is done by first proving safety—correctness for one step, starting from an arbitrary initial state that is possibly restricted by invariant constraints. By induction, the implementation ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Abstract—The paper presents an indirect method to automatically prove liveness for pipelined microprocessors. This is done by first proving safety—correctness for one step, starting from an arbitrary initial state that is possibly restricted by invariant constraints. By induction

Maurer Computers for Pipelined Instruction Processing

by J. A. Bergstra , C. A. Middelburg - UNDER CONSIDERATION FOR PUBLICATION IN MATH. STRUCT. IN COMP. SCIENCE , 2006
"... We model micro-architectures with non-pipelined instruction processing and pipelined instruction processing, using Maurer machines, basic thread algebra and program algebra. We show that stored programs are executed as intended with these micro-architectures. We believe that this work provides a new ..."
Abstract - Cited by 11 (8 self) - Add to MetaCart
We model micro-architectures with non-pipelined instruction processing and pipelined instruction processing, using Maurer machines, basic thread algebra and program algebra. We show that stored programs are executed as intended with these micro-architectures. We believe that this work provides a

Proving optimizations correct using parameterized program equivalence

by Sudipta Kundu, Zachary Tatlock, Sorin Lerner - In Proceedings of the 2009 Conference on Programming Language Design and Implementation (PLDI 2009 , 2009
"... Translation validation is a technique for checking that, after an optimization has run, the input and output of the optimization are equivalent. Traditionally, translation validation has been used to prove concrete, fully specified programs equivalent. In this paper we present Parameterized Equivale ..."
Abstract - Cited by 23 (4 self) - Add to MetaCart
known property is that it does not modify certain variables. By proving parameterized programs equivalent, PEC can prove the correctness of transformation rules that represent complex optimizations once and for all, before they are ever run. We implemented our PEC technique in a tool that can establish
Next 10 →
Results 1 - 10 of 120
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University