Proceedings of the 33rd Annual Conference on Design Automation Conference - DAC '96 1996
DOI: 10.1145/240518.240639
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of an efficient parallel BDD package

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(13 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…Most parallel or distributed work on symbolic reachability analysis employs a vertical slicing scheme to parallelize BDD manipulations, where image computation jobs are spawned and queued on the individual workstations of the NOW [19,21,29], allowing the algorithm to overlap image computation. Figure 10 shows how an MDDs can be decomposed into three portions where x 5 and x 4 are selected as slicing variables (the corresponding MDD nodes are indicated with solid boxes).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most parallel or distributed work on symbolic reachability analysis employs a vertical slicing scheme to parallelize BDD manipulations, where image computation jobs are spawned and queued on the individual workstations of the NOW [19,21,29], allowing the algorithm to overlap image computation. Figure 10 shows how an MDDs can be decomposed into three portions where x 5 and x 4 are selected as slicing variables (the corresponding MDD nodes are indicated with solid boxes).…”
Section: Related Workmentioning
confidence: 99%
“…For explicit reachability analysis or model checking, references [1,24,27] introduce algorithms that use the overall resources of a network of workstations (NOW). For symbolic reachability analysis or model checking, most works employ a vertical slicing scheme to parallelize BDD manipulations by spawning multiple image computations over the NOW, corresponding to distinct sets of paths through the BDD [19,21,28]. Algorithms following this scheme can overlap the application of the next-state function to sets of states encoded by different decision diagram node, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…Distributed Dynamic Hashing (DDH) [4] offered an alternative approach to LH* while EH* [5] provided a distributed version of EH [17]. Although in a very specific application context, [18] have exploited a very similar concept to DPH, named two-level hashing. Distributed versions of several other classical data structures, such as trees [7,8] and even hybrid structures, such as hash-trees [19], have also been designed.…”
Section: Related Workmentioning
confidence: 99%
“…The use of distributed processing to increase the speedup and capacity of model checking has recently begun to generate interest [5,29,22,1,27,20,15,30,24]. Distributed techniques that achieve these goals do so by exploiting the cumulative computational power and memory of a cluster of computers.…”
Section: Introductionmentioning
confidence: 99%