2009 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition 2009
DOI: 10.1109/date.2009.5090644
|View full text |Cite
|
Sign up to set email alerts
|

Multi-clock Soc design using protocol conversion

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…Moreover, once the existence of a converter is determined, how to synthesize it? More recently, a set of formal techniques have been proposed [1]- [5] to address these questions. Table 1 compares these approaches over a range of features.…”
Section: Partha Roop Was Supported By Research and Study Leave From Amentioning
confidence: 99%
See 3 more Smart Citations
“…Moreover, once the existence of a converter is determined, how to synthesize it? More recently, a set of formal techniques have been proposed [1]- [5] to address these questions. Table 1 compares these approaches over a range of features.…”
Section: Partha Roop Was Supported By Research and Study Leave From Amentioning
confidence: 99%
“…The features listed as columns of Table 1 are: the modelling language for protocols, the language for describing desired specifications, multiple protocols (two and more than two), type of conversion algorithm, whether the approach can handle uncontrollable events, event buffering, whether data-width mismatches are handled, whether clock mismatches are handled, and finally the type of control action used. Among the proposed techniques, most approaches use Labeled Transition Systems (LTS) to describe both protocols and specifications, except [5] where CTL temporal logic is used for the specification part. Also, except the approach of [3]- [5] which use oversampling [11] to bridge clock mismatches, all other techniques ignore clock mismatches.…”
Section: Partha Roop Was Supported By Research and Study Leave From Amentioning
confidence: 99%
See 2 more Smart Citations
“…However, it may be noted that the WCRT analysis problem developed here is essentially a safety checking problem over synchronous automata with bounded integers. Hence, this analysis may be done using a custom tool in the future to make the analysis both optimal and also to prove that the proposed analysis indeed results in tight WCRT similar in spirit to a recent model checking work on bounded integers for SoC data-exchange protocols [20].…”
Section: Complexitymentioning
confidence: 99%