Scalable automated verification via expert-system guided transformations

H Mony, J Baumgartner, V Paruthi… - … conference on formal …, 2004 - Springer
Transformation-based verification has been proposed to synergistically leverage various
transformations to successively simplify and decompose large problems to ones which may …

Exploiting suspected redundancy without proving it

H Mony, J Baumgartner, V Paruthi… - Proceedings of the 42nd …, 2005 - dl.acm.org
We present several improvements to general-purpose sequential redundancy removal.(1)
We propose using a robust variety of synergistic transformation and verification algorithms to …

Maximal input reduction of sequential netlists via synergistic reparameterization and localization strategies

J Baumgartner, H Mony - … Conference on Correct Hardware Design and …, 2005 - Springer
Automatic formal verification techniques generally require exponential resources with
respect to the number of primary inputs of a netlist. In this paper, we present several fully …

Enabling large-scale pervasive logic verification through multi-algorithmic formal reasoning

T Glokler, J Baumgartner… - … Formal Methods in …, 2006 - ieeexplore.ieee.org
Pervasive logic is a broad term applied to the variety of logic present in hardware designs,
yet not a part of their primary functionality. Examples of pervasive logic include initialization …

Exploiting constraints in transformation-based verification

H Mony, J Baumgartner, A Aziz - Advanced Research Working …, 2005 - Springer
The modeling of design environments using constraints has gained widespread industrial
application, and most verification languages include constructs for specifying constraints. It …

Enhanced diameter bounding via structural transformation

J Baumgartner, A Kuehlmann - … Design, Automation and Test in …, 2004 - ieeexplore.ieee.org
Bounded model checking (BMC) has gained widespread industrial use due to its relative
scalability. Its exhaustiveness over all valid input vectors allows it to expose arbitrarily …

Self-referential verification of gate-level implementations of arithmetic circuits

YT Chang, K Ting - Proceedings of the 39th annual Design Automation …, 2002 - dl.acm.org
Verification of gate-level implementations of arithmetic circuits is challenging due to a
number of reasons: the existence of some hard-to-verify arithmetic operators (eg …

Combinational equivalence checking through function transformation

HH Kwak, IH Moon, JH Kukula, TR Shiple - Proceedings of the 2002 …, 2002 - dl.acm.org
Circuits can be simplified for combinational equivalence checking by transforming internal
functions, while preserving their ranges. In this paper, we investigate how to effiectively …

Non-miter-based combinational equivalence checking by comparing BDDs with different variable orders

IH Moon, C Pixley - International Conference on Formal Methods in …, 2004 - Springer
This paper describes a new method that is useful in combinational equivalence checking
with very challenging industrial designs. The method does not build a miter; instead it builds …

Bit-Level Model Checking

A Ivrii, Y Vizel - Handbook of Computer Architecture, 2022 - Springer
Ensuring that a design conforms to its specification is an indispensable part of the modern
design automation flow. Model checking is an automated verification technique for checking …