[图书][B] Computer-aided reasoning: ACL2 case studies

M Kaufmann, P Manolios, JS Moore - 2013 - books.google.com
Computer-Aided Reasoning: ACL2 Case Studies illustrates how the computer-aided
reasoning system ACL2 can be used in productive and innovative ways to design, build, and …

Automatic verification of pipelined microprocessor control

JR Burch, DL Dill - … Aided Verification: 6th International Conference, CAV' …, 1994 - Springer
We describe a technique for verifying the control logic of pipelined microprocessors. It
handles more complicated designs, and requires less human intervention, than existing …

Formal verification in hardware design: a survey

C Kern, MR Greenstreet - ACM Transactions on Design Automation of …, 1999 - dl.acm.org
In recent years, formal methods have emerged as an alternative approach to ensuring the
quality and correctness of hardware designs, overcoming some of the limitations of …

Architectural principles for safety-critical real-time applications

JH Lala, RE Harper - Proceedings of the IEEE, 1994 - ieeexplore.ieee.org
This paper addresses the general area of computer architectures for safety-critical real time
applications. The maximum acceptable probability of failure for these applications ranges …

Secure, efficient data transport and replica management for high-performance data-intensive computing

B Allcock, J Bester, J Bresnahan… - … IEEE Symposium on …, 2001 - ieeexplore.ieee.org
An emerging class of data-intensive applications involve the geographically dispersed
extraction of complex scientific information from very large collections of measured or …

Defeating UCI: Building stealthy and malicious hardware

C Sturton, M Hicks, D Wagner… - 2011 IEEE symposium on …, 2011 - ieeexplore.ieee.org
In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI)
for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm …

Partial-order reduction in symbolic state space exploration

R Alur, RK Brayton, TA Henzinger, S Qadeer… - … Aided Verification: 9th …, 1997 - Springer
State space explosion is a fundamental obstacle in formal verification of designs and
protocols. Several techniques for combating this problem have emerged in the past few …

Symbolic verification with periodic sets

B Boigelot, P Wolper - … Verification: 6th International Conference, CAV'94 …, 1994 - Springer
Symbolic approaches attack the state explosion problem by introducing implicit
representations that allow the simultaneous manipulation of large sets of states. The most …

ACL2 theorems about commercial microprocessors

B Brock, M Kaufmann, JS Moore - … on Formal Methods in Computer-Aided …, 1996 - Springer
ACL2 is a mechanized mathematical logic intended for use in specifying and proving
properties of computing machines. In two independent projects, industrial engineers have …

Systematic software-based self-test for pipelined processors

D Gizopoulos, M Psarakis, M Hatzimihail… - … Transactions on Very …, 2008 - ieeexplore.ieee.org
Software-based self-test (SBST) has recently emerged as an effective methodology for the
manufacturing test of processors and other components in systems-on-chip (SoCs). By …