Results 1 - 10
of
70
DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design
- In Proc. 32nd Annual Intl. Symp. on Microarchitecture
, 1999
"... Building a high-petformance microprocessor presents many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that work reliably in varied (and occasionally adverse) operating conditions. To&rther complicate this task, deep submicro ..."
Abstract
-
Cited by 374 (15 self)
- Add to MetaCart
Building a high-petformance microprocessor presents many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that work reliably in varied (and occasionally adverse) operating conditions. To&rther complicate this task, deep
Verifying Advanced Microarchitectures that Support Speculation and Exceptions
- Computer-Aided Verification (CAV2000), LNCS 1855
, 2000
"... In this paper, we discuss the verification of a microprocessor involving a reorder buffer, a store buffer, speculative execution and exceptions at the microarchitectural level. We extend the earlier proposed Completion Functions Approach [HSG98] in a uniform manner to handle the verification of such ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
In this paper, we discuss the verification of a microprocessor involving a reorder buffer, a store buffer, speculative execution and exceptions at the microarchitectural level. We extend the earlier proposed Completion Functions Approach [HSG98] in a uniform manner to handle the verification
Verifying Micro-Architecture Simulators using Event Traces
"... Contemporary micro-architecture research inherently relies on cycleaccurate simulators to test new ideas. Typical simulator implementations involve tens of thousands of lines of high-level code. Although general software engineering verification and validation techniques can be applied, the mere com ..."
Abstract
- Add to MetaCart
Contemporary micro-architecture research inherently relies on cycleaccurate simulators to test new ideas. Typical simulator implementations involve tens of thousands of lines of high-level code. Although general software engineering verification and validation techniques can be applied, the mere
Microarchitecture Verification by Compositional Model Checking
, 2001
"... Abstract. Compositional model checking is used to verify a processor microarchitecture containing most of the features of a modern microprocessor, including branch prediction, speculative execution, out-of-order execution and a load-store buffer supporting re-ordering and load forwarding. We observe ..."
Abstract
-
Cited by 34 (2 self)
- Add to MetaCart
Abstract. Compositional model checking is used to verify a processor microarchitecture containing most of the features of a modern microprocessor, including branch prediction, speculative execution, out-of-order execution and a load-store buffer supporting re-ordering and load forwarding. We
On embedding a microarchitectural design language within Haskell
- In Proceedings of the ACM SIGPLAN International Conference on Functional Programming (ICFP ’99
, 1999
"... Based on our experience with modelling and verifying microarchitectural designs within Haskell, this paper examines our use of Haskell as host for an embedded language. In particular, we highlight our use of Haskell's lazy lists, type classes, lazy state monad, and unsafePerformIO, and point to ..."
Abstract
-
Cited by 39 (4 self)
- Add to MetaCart
Based on our experience with modelling and verifying microarchitectural designs within Haskell, this paper examines our use of Haskell as host for an embedded language. In particular, we highlight our use of Haskell's lazy lists, type classes, lazy state monad, and unsafePerformIO, and point
Using Term Rewriting Systems to Design and Verify Processors
- IEEE MICRO
, 1998
"... We present a novel use of Term Rewriting Systems (TRS's) to describe micro-architectures. The state of a system is represented as a TRS term while the state transitions are represented as TRS rules. TRS descriptions are amenable to both verification and synthesis. We illustrate the use of TR ..."
Abstract
-
Cited by 61 (4 self)
- Add to MetaCart
We present a novel use of Term Rewriting Systems (TRS's) to describe micro-architectures. The state of a system is represented as a TRS term while the state transitions are represented as TRS rules. TRS descriptions are amenable to both verification and synthesis. We illustrate the use
Microarchitecture and Performance Analysis of a
"... We developed a 1.3-GHz SPARC-V9 processor: the SPARC64 V. This processor is designed to address requirements for enterprise servers and high-performance computing. Processing speed under multi-user interactive workloads is very sensitive to system balance because of the large number of memory reques ..."
Abstract
- Add to MetaCart
, which consists of a detailed processor model and detailed memory model, before hardware design was started. We updated it continuously. Once a logic simulator became available, we used it to verify the performance model for improving its accuracy. The model quite effectively enabled us to achieve
Rescue: A Microarchitecture for Testability and Defect Tolerance
- In ISCA ’05: Proceedings of the 32nd annual international symposium on Computer Architecture
, 2005
"... Scaling feature size improves processor performance but increases each device’s susceptibility to defects (i.e., hard errors). As a result, fabrication technology must improve significantly to maintain yields. Redundancy techniques in memory have been successful at improving yield in the presence of ..."
Abstract
-
Cited by 29 (1 self)
- Add to MetaCart
to the microarchitectural-block granularity. We propose logic transformations to redesign conventional superscalar microarchitecture to comply with ICI. We call our novel, testable, and defecttolerant microarchitecture Rescue. We build a verilog model of Rescue and verify that faults can be isolated to the required
Proving the Correctness of Pipelined Micro-Architectures
- Proc. of the ITG/GI/GMM Workshop, (Ed K. Waldschmidt and C. Grimm), VDE Verlag
, 2000
"... This paper presents how to generate the implementation of a pipelined microprocessor from an arbitrary sequential specification. All necessary forwarding and stalling logic is created automatically. The implementation is provided in the language of the theorem proving system (PVS). This implementati ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
). This implementation is translated to the Verilog hardware description language. Furthermore, a mathematical correctness proof for the machine is supplied. This proof is verified by the theorem proving system.
Microarchitectural Modeling using Process Networks
"... Kahn process networks can be used to quickly design and verify potentially complex architectures. These architectures can include a fixed module interface style, explicit communication, abstraction, extensive parameterization, highperformance microarchitectures, and unconventional interconnect topol ..."
Abstract
- Add to MetaCart
Kahn process networks can be used to quickly design and verify potentially complex architectures. These architectures can include a fixed module interface style, explicit communication, abstraction, extensive parameterization, highperformance microarchitectures, and unconventional interconnect
Results 1 - 10
of
70