• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 70
Next 10 →

DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design

by Todd M. Austin - In Proc. 32nd Annual Intl. Symp. on Microarchitecture , 1999
"... Building a high-petformance microprocessor presents many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that work reliably in varied (and occasionally adverse) operating conditions. To&rther complicate this task, deep submicro ..."
Abstract - Cited by 374 (15 self) - Add to MetaCart
Building a high-petformance microprocessor presents many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that work reliably in varied (and occasionally adverse) operating conditions. To&rther complicate this task, deep

Verifying Advanced Microarchitectures that Support Speculation and Exceptions

by Ravi Hosabettu, Ganesh Gopalakrishnan, Mandayam Srivas - Computer-Aided Verification (CAV2000), LNCS 1855 , 2000
"... In this paper, we discuss the verification of a microprocessor involving a reorder buffer, a store buffer, speculative execution and exceptions at the microarchitectural level. We extend the earlier proposed Completion Functions Approach [HSG98] in a uniform manner to handle the verification of such ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
In this paper, we discuss the verification of a microprocessor involving a reorder buffer, a store buffer, speculative execution and exceptions at the microarchitectural level. We extend the earlier proposed Completion Functions Approach [HSG98] in a uniform manner to handle the verification

Verifying Micro-Architecture Simulators using Event Traces

by Hui Meen, Nyew Nilufer, Onder Soner, Onder Zhenlin Wang
"... Contemporary micro-architecture research inherently relies on cycleaccurate simulators to test new ideas. Typical simulator implementations involve tens of thousands of lines of high-level code. Although general software engineering verification and validation techniques can be applied, the mere com ..."
Abstract - Add to MetaCart
Contemporary micro-architecture research inherently relies on cycleaccurate simulators to test new ideas. Typical simulator implementations involve tens of thousands of lines of high-level code. Although general software engineering verification and validation techniques can be applied, the mere

Microarchitecture Verification by Compositional Model Checking

by Ranjit Jhala, Kenneth L. Mcmillan , 2001
"... Abstract. Compositional model checking is used to verify a processor microarchitecture containing most of the features of a modern microprocessor, including branch prediction, speculative execution, out-of-order execution and a load-store buffer supporting re-ordering and load forwarding. We observe ..."
Abstract - Cited by 34 (2 self) - Add to MetaCart
Abstract. Compositional model checking is used to verify a processor microarchitecture containing most of the features of a modern microprocessor, including branch prediction, speculative execution, out-of-order execution and a load-store buffer supporting re-ordering and load forwarding. We

On embedding a microarchitectural design language within Haskell

by John Launchbury, Jeffrey R. Lewis, Byron Cook - In Proceedings of the ACM SIGPLAN International Conference on Functional Programming (ICFP ’99 , 1999
"... Based on our experience with modelling and verifying microarchitectural designs within Haskell, this paper examines our use of Haskell as host for an embedded language. In particular, we highlight our use of Haskell's lazy lists, type classes, lazy state monad, and unsafePerformIO, and point to ..."
Abstract - Cited by 39 (4 self) - Add to MetaCart
Based on our experience with modelling and verifying microarchitectural designs within Haskell, this paper examines our use of Haskell as host for an embedded language. In particular, we highlight our use of Haskell's lazy lists, type classes, lazy state monad, and unsafePerformIO, and point

Using Term Rewriting Systems to Design and Verify Processors

by Arvind, Xiaowei Shen - IEEE MICRO , 1998
"... We present a novel use of Term Rewriting Systems (TRS's) to describe micro-architectures. The state of a system is represented as a TRS term while the state transitions are represented as TRS rules. TRS descriptions are amenable to both verification and synthesis. We illustrate the use of TR ..."
Abstract - Cited by 61 (4 self) - Add to MetaCart
We present a novel use of Term Rewriting Systems (TRS's) to describe micro-architectures. The state of a system is represented as a TRS term while the state transitions are represented as TRS rules. TRS descriptions are amenable to both verification and synthesis. We illustrate the use

Microarchitecture and Performance Analysis of a

by Sparc-V Microprocessor For, Mariko Sakamoto, Akira Katsuno, Aiichiro Inoue, Takeo Asakawa, Haruhiko Ueno, Kuniki Morita, Yasunori Kimura
"... We developed a 1.3-GHz SPARC-V9 processor: the SPARC64 V. This processor is designed to address requirements for enterprise servers and high-performance computing. Processing speed under multi-user interactive workloads is very sensitive to system balance because of the large number of memory reques ..."
Abstract - Add to MetaCart
, which consists of a detailed processor model and detailed memory model, before hardware design was started. We updated it continuously. Once a logic simulator became available, we used it to verify the performance model for improving its accuracy. The model quite effectively enabled us to achieve

Rescue: A Microarchitecture for Testability and Defect Tolerance

by Ethan Schuchman, T. N. Vijaykumar - In ISCA ’05: Proceedings of the 32nd annual international symposium on Computer Architecture , 2005
"... Scaling feature size improves processor performance but increases each device’s susceptibility to defects (i.e., hard errors). As a result, fabrication technology must improve significantly to maintain yields. Redundancy techniques in memory have been successful at improving yield in the presence of ..."
Abstract - Cited by 29 (1 self) - Add to MetaCart
to the microarchitectural-block granularity. We propose logic transformations to redesign conventional superscalar microarchitecture to comply with ICI. We call our novel, testable, and defecttolerant microarchitecture Rescue. We build a verilog model of Rescue and verify that faults can be isolated to the required

Proving the Correctness of Pipelined Micro-Architectures

by Daniel Kroening, Wolfgang J. Paul, Silvia M. Mueller - Proc. of the ITG/GI/GMM Workshop, (Ed K. Waldschmidt and C. Grimm), VDE Verlag , 2000
"... This paper presents how to generate the implementation of a pipelined microprocessor from an arbitrary sequential specification. All necessary forwarding and stalling logic is created automatically. The implementation is provided in the language of the theorem proving system (PVS). This implementati ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
). This implementation is translated to the Verilog hardware description language. Furthermore, a mathematical correctness proof for the machine is supplied. This proof is verified by the theorem proving system.

Microarchitectural Modeling using Process Networks

by unknown authors
"... Kahn process networks can be used to quickly design and verify potentially complex architectures. These architectures can include a fixed module interface style, explicit communication, abstraction, extensive parameterization, highperformance microarchitectures, and unconventional interconnect topol ..."
Abstract - Add to MetaCart
Kahn process networks can be used to quickly design and verify potentially complex architectures. These architectures can include a fixed module interface style, explicit communication, abstraction, extensive parameterization, highperformance microarchitectures, and unconventional interconnect
Next 10 →
Results 1 - 10 of 70
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University