Verification of interconnects
暂无分享,去创建一个
[1] Thomas Kropf,et al. Introduction to Formal Hardware Verification , 1999, Springer Berlin Heidelberg.
[2] Jja Jeroen Keiren,et al. Advanced reduction techniques for model checking , 2013 .
[3] Niklas Sörensson,et al. An Extensible SAT-solver , 2003, SAT.
[4] Hans Zantema,et al. Relaxation of 3-partition instances , 2013, CTW.
[5] Rjm Rolf Theunissen. Supervisory control in health care systems , 2015 .
[6] Jehoshua Bruck,et al. Cyclic Boolean circuits , 2012, Discret. Appl. Math..
[7] Anja Guzzi,et al. Supporting Developers' Teamwork from within the IDE , 2015 .
[8] Rolf Drechsler,et al. MONSOON: SAT-Based ATPG for Path Delay Faults Using Multiple-Valued Logics , 2010, J. Electron. Test..
[9] Joost Winter,et al. Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .
[10] Armin Biere,et al. Symbolic Model Checking without BDDs , 1999, TACAS.
[11] Jehoshua Bruck,et al. The synthesis of cyclic combinational circuits , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[12] Zeljko Zilic,et al. Incorporating efficient assertion checkers into hardware emulation , 2005, 2005 International Conference on Computer Design.
[13] John D. Backes,et al. The analysis of cyclic circuits with Boolean satisfiability , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[14] Alfons Laarman,et al. Scalable multi-core model checking , 2014 .
[15] Minh Tri Ngo,et al. Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs , 2014 .
[16] Michael Kishinevsky,et al. Automatic generation of inductive invariants from high-level microarchitectural models of communication fabrics , 2012, Formal Methods Syst. Des..
[17] Roel Verdult,et al. The (in)security of proprietary cryptography , 2015 .
[18] Helmut Veith,et al. On the Complexity of Symbolic Verification and Decision Problems in Bit-Vector Logic , 2014, MFCS.
[19] Julien Schmaltz,et al. A Comment on “A Necessary and Sufficient Condition for Deadlock-Free Adaptive Routing in Wormhole Networks” , 2011, IEEE Transactions on Parallel and Distributed Systems.
[20] Gerhard de Koning Gans,et al. Outsmarting smart cards , 2013 .
[21] Sebastiaan J. C. Joosten,et al. Process algebra semantics & reachability analysis for micro-architectural models of communication fabrics , 2015, 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE).
[22] Mjm Marcel Roeloffzen. Kinetic data structures in the black-box model , 2013 .
[23] Sebastiaan J. C. Joosten,et al. Scalable liveness verification for communication fabrics , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[24] Julien Schmaltz,et al. Hunting deadlocks efficiently in microarchitectural models of communication fabrics , 2011, 2011 Formal Methods in Computer-Aided Design (FMCAD).
[25] Sebastiaan J. C. Joosten,et al. A Macro for Reusing Abstract Functions and Theorems , 2013, ACL2.
[26] Don Mills,et al. Verilog and SystemVerilog Gotchas , 2007 .
[27] Jeffrey Voas,et al. Building Blocks of the Internet of Things , 2016, 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE).
[28] Tom Melham,et al. Abstraction Mechanisms for Hardware Verification , 1988 .
[29] Dhp Dirk Gerrits. Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .
[30] Enrico Tronci,et al. Correct Hardware Design and Verification Methods , 2003, Lecture Notes in Computer Science.
[31] Rolf Drechsler,et al. On Acceleration of SAT-Based ATPG for Industrial Designs , 2008, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[32] Armin Biere,et al. Bounded model checking , 2003, Adv. Comput..
[33] Sol Swords,et al. Centaur Technology Media Unit Verification , 2009, CAV.
[34] Adrianus Johannus Paulus Jeckmans. Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .
[35] Robert K. Brayton,et al. Scalable progress verification in credit-based flow-control systems , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[36] Kees G. W. Goossens,et al. Deadlock Prevention in the Æthereal Protocol , 2005, CHARME.
[37] Marijn Paul Schraagen,et al. Aspects of record linkage , 2014 .
[38] Carst Tankink. Documentation and formal mathematics : web technology meets theorem proving , 2013 .
[39] Elizabeth M. Rudnick,et al. Microprocessor Design Verification , 2000, The VLSI Handbook.
[40] Rudy van Vliet,et al. DNA expressions - A formal notation for DNA , 2015 .
[41] Sebastiaan J. C. Joosten,et al. Formal Deadlock Verification for Click Circuits , 2013, 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems.
[42] Sebastiaan J. C. Joosten,et al. Automatic extraction of micro-architectural models of communication fabrics from register transfer level designs , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[43] Andreas Kuehlmann. Dynamic transition relation simplification for bounded property checking , 2004, IEEE/ACM International Conference on Computer Aided Design, 2004. ICCAD-2004..
[44] Frank S. de Boer,et al. Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.
[45] Sayak Ray,et al. Scalable Model Checking Beyond Safety - A Communication Fabric Perspective , 2013 .
[46] N Neda Noroozi,et al. Improving input-output conformance testing theories , 2014 .
[47] Axel Belinfante,et al. JTorX: exploring model-based testing , 2014 .
[48] M. S. Greiler,et al. Test Suite Comprehension for Modular and Dynamic Systems , 2013 .
[49] Eduardo Zambon,et al. Abstract Graph Transformation - Theory and Practice , 2013 .
[50] Ümit Y. Ogras,et al. xMAS: Quick Formal Modeling of Communication Fabrics to Enable Verification , 2012, IEEE Design & Test of Computers.
[51] Gergely Alpár,et al. Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world] , 2015 .
[52] E. Gebler,et al. Robust SOS Specifications of Probabilistic Processes , 2015 .
[53] Ashwani Singh,et al. Formal verification methodology considerations for network on chips , 2012, ICACCI '12.
[54] Ken Coffman. Real World FPGA Design with Verilog , 1999 .
[55] Julien Schmaltz,et al. WickedXmas : designing and verifying on-chip communication fabrics , 2014 .
[56] José Duato,et al. 994 International Conference on Parallel Processing a Necessary and Sufficient Condition for Deadlock-free Adaptive Routing in Wormhole Networks , 2022 .
[57] L. Lensink,et al. Applying formal methods in software development , 2013 .
[58] Robbert Krebbers,et al. The C standard formalized in Coq , 2015 .
[59] Frank W. Takes. Algorithms for analyzing and mining real-world graphs , 2014 .
[60] John Businge,et al. Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.
[61] Stephen A. Edwards,et al. Transforming Cyclic Circuits Into Acyclic Equivalents , 2008, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[62] Cuiting Chen,et al. Automated Fault Localization for Service-Oriented Software Systems , 2015 .
[63] Jeroen Bransen,et al. On the Incremental Evaluation of Higher-Order Attribute Grammars , 2015 .
[64] Aarti Gupta,et al. Formal hardware verification methods: A survey , 1992, Formal Methods Syst. Des..
[65] Sander van der Burg,et al. A Reference Architecture for Distributed Software Deployment , 2013 .
[66] Tiziana Margaria,et al. Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 2017 , 2001, International Journal on Software Tools for Technology Transfer.
[67] Joeri de Ruiter,et al. Lessons learned in the analysis of the EMV and TLS security protocols , 2015 .
[68] Michael Kishinevsky,et al. A System Verilog Rewriting System for RTL Abstraction with Pentium Case Study , 2008, 2008 6th ACM/IEEE International Conference on Formal Methods and Models for Co-Design.
[69] Michiel Helvensteijn,et al. Abstract delta modeling : software product lines and beyond , 2014 .
[70] Stefan Dietzel,et al. Resilient in-network aggregation for vehicular networks , 2015 .
[71] Georgeta Igna,et al. Performance analysis of real-time task systems using timed automata , 2013 .
[72] van den,et al. Composition and synchronization of real-time components upon one processor , 2013 .
[73] Tiago Espinha,et al. Web Service Growing Pains: Understanding Services and Their Clients , 2015 .
[74] S Sjoerd Cranen,et al. Getting the point : obtaining and understanding fixpoints in model checking , 2015 .
[75] Farimah Farahmandi,et al. Groebner basis based formal verification of large arithmetic circuits using Gaussian elimination and cone-based polynomial extraction , 2015, Microprocess. Microsystems.
[76] Wouter Meulemans,et al. Similarity measures and algorithms for cartographic schematization , 2014 .
[77] Sebastiaan J. C. Joosten,et al. Type Checking by Domain Analysis in Ampersand , 2015, RAMICS.
[78] Sebastiaan J. C. Joosten,et al. Generation of inductive invariants from register transfer level designs of communication fabrics , 2013, 2013 Eleventh ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2013).
[79] R.W.J. Kersten,et al. Software analysis methods for resource-sensitive systems , 2015 .
[80] van der,et al. Domain specific languages and their type systems , 2014 .
[81] T. V. Bui,et al. A software architecture for body area sensor networks : flexibility and trustworthiness , 2015 .
[82] Simon L. Peyton Jones,et al. Lazy functional state threads , 1994, PLDI '94.
[83] Pim Vullers,et al. Efficient implementations of attribute-based credentials on smart cards , 2014 .
[84] Fides Aarts,et al. Tomte : bridging the gap between active learning and real-world systems , 2014 .
[85] Yanja Dajsuren,et al. On the design of an architecture framework and quality evaluation for automotive software systems , 2015 .
[86] J. Bergstra,et al. Process Algebra with Five-Valued Conditions , 2001 .
[87] José Duato,et al. A New Theory of Deadlock-Free Adaptive Routing in Wormhole Networks , 1993, IEEE Trans. Parallel Distributed Syst..
[88] B. Lijnse,et al. TOP to the rescue. Task-oriented programming for incident response applications , 2005 .
[89] Marco Roveri,et al. The nuXmv Symbolic Model Checker , 2014, CAV.
[90] Ieee Standards Board. IEEE standard verilog hardware description language , 2001 .
[91] Ronald L. Rivest. The Necessity of Feedback in Minimal Monotone Combinational Circuits , 1977, IEEE Transactions on Computers.
[92] Julien Schmaltz,et al. Easy Formal Specification and Validation of Unbounded Networks-on-Chips Architectures , 2012, TODE.
[93] Amit Gupta,et al. Acyclic modeling of combinational loops , 2005, ICCAD-2005. IEEE/ACM International Conference on Computer-Aided Design, 2005..
[94] Vigyan Singhal,et al. Sign-off with Bounded Formal Verification Proofs , 2014 .
[95] Stephen A. Edwards,et al. Making cyclic circuits acyclic , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[96] Kees Goossens,et al. AEthereal network on chip: concepts, architectures, and implementations , 2005, IEEE Design & Test of Computers.
[97] Cor-Paul Bezemer,et al. Performance Optimization of Multi-Tenant Software Systems , 2014 .
[98] Dina Hadžiosmanović,et al. The process matters: cyber security in industrial control systems , 2014 .
[99] Stjepan Picek,et al. Applications of evolutionary computation to cryptology , 2015 .
[100] Lionel Mamane,et al. Interactive mathematical documents: creation and presentation , 2004 .
[101] A. J. van der Ploeg,et al. Efficient abstractions for visualization and interaction , 2015 .
[102] Aaron R. Bradley,et al. SAT-Based Model Checking without Unrolling , 2011, VMCAI.
[103] Emden R. Gansner,et al. Graphviz - Open Source Graph Drawing Tools , 2001, GD.
[104] Mark Timmer,et al. Efficient modelling, generation and analysis of Markov automata , 2013 .
[105] Qi Zhu,et al. SAT sweeping with local observability don't-cares , 2006, 2006 43rd ACM/IEEE Design Automation Conference.
[106] Kees Goossens,et al. Embedding hardware description languages in proof systems , 1993, CST.
[107] Julien Schmaltz,et al. Towards the formal verification of cache coherency at the architectural level , 2012, TODE.
[108] Sebastiaan J. C. Joosten,et al. Initial Experiments with TPTP-style Automated Theorem Provers on ACL2 Problems , 2014, ACL2.
[109] Fabio Somenzi,et al. Arithmetic Boolean Expression Manipulator Using BDDs , 1997, Formal Methods Syst. Des..
[110] Ümit Y. Ogras,et al. Quick formal modeling of communication fabrics to enable verification , 2010, 2010 IEEE International High Level Design Validation and Test Workshop (HLDVT).
[111] Elisa Costante,et al. Privacy throughout the data cycle , 2015 .
[112] Kwang-Ting Cheng,et al. A case study of Time-Multiplexed Assertion Checking for post-silicon debugging , 2010, 2010 IEEE International High Level Design Validation and Test Workshop (HLDVT).
[113] R. Brayton,et al. FRAIGs: A Unifying Representation for Logic Synthesis and Verification , 2005 .
[114] J. van den Bos,et al. Gathering evidence: Model-driven software engineering in automated digital forensics , 2014 .
[115] Julien Schmaltz,et al. Inference of channel types in micro-architectural models of on-chip communication networks , 2014, 2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC).
[116] John D. Backes,et al. The Synthesis of Cyclic Dependencies with Boolean Satisfiability , 2012, TODE.