IEEE/ACM International Conference on Computer Aided Design, 2004. ICCAD-2004.
DOI: 10.1109/iccad.2004.1382541
|View full text |Cite
|
Sign up to set email alerts
|

DAG-aware circuit compression for formal verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
45
0

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(46 citation statements)
references
References 13 publications
1
45
0
Order By: Relevance
“…Our work on AIGs was motivated by fast compression of Boolean networks in formal verification [5]. We extended this method to work in synthesis, by making it delay-aware and replacing two-level structural matching of AIG subgraphs with functional matching of the subgraphs based on enumeration of 4-input cuts [26].…”
Section: Introductionmentioning
confidence: 99%
“…Our work on AIGs was motivated by fast compression of Boolean networks in formal verification [5]. We extended this method to work in synthesis, by making it delay-aware and replacing two-level structural matching of AIG subgraphs with functional matching of the subgraphs based on enumeration of 4-input cuts [26].…”
Section: Introductionmentioning
confidence: 99%
“…Further, depth is optimized by integrating AIG balancing using algebraic treeheight reduction [7] as part of the algorithm. The approach in [6] extends [8] which presents a similar rewriting algorithm that is applied in a top-down manner. The approach in [8] does not consider depth-preserving rewrites.…”
Section: Background a Related Workmentioning
confidence: 99%
“…The approach in [6] extends [8] which presents a similar rewriting algorithm that is applied in a top-down manner. The approach in [8] does not consider depth-preserving rewrites. In [9], the approach in [6] is extended to 5-input cuts.…”
Section: Background a Related Workmentioning
confidence: 99%
“…In addition we work with constraints explicitly, a fact which entangles the cones of the objectives even more tightly. Finally, we do not use local BDDs [16] or AIG rewriting [5] to optimize the problem instance; instead we rely on saturation [24] and on learning from SSAT → to achieve a compact representation.…”
Section: Related Workmentioning
confidence: 99%