1992
DOI: 10.1007/bf00709156
|View full text |Cite
|
Sign up to set email alerts
|

Verification of a multiprocessor cache protocol using simulation relations and higher-order logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

1993
1993
2004
2004

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Several proofs of SC for parameterized protocols are manual in nature. Some [21,26,3] use theorem-provers, while others use formal frameworks to provide a rigorous proof [24]. In either case, a human must develop insights needed to build up the proof, and the process is quite time-consuming.…”
Section: Related Workmentioning
confidence: 99%
“…Several proofs of SC for parameterized protocols are manual in nature. Some [21,26,3] use theorem-provers, while others use formal frameworks to provide a rigorous proof [24]. In either case, a human must develop insights needed to build up the proof, and the process is quite time-consuming.…”
Section: Related Workmentioning
confidence: 99%
“…Another technique for validating protocols relies on logical proofs [5,15,20]. This approach can validate a full range of properties.…”
Section: Current Approachesmentioning
confidence: 99%
“…The details and complications of this approach are beyond the scope of this paper, and the reader is referred to [20,21,10,1] for them. Following the approach in [1,21,20,16] 3 the proof of correctness makes use of an abstraction function that maps an implementation state into a corresponding specification state. Correctness can then be reduced to showing that for any execution trace of the implementation machine there exists a corresponding execution trace of the specification machine.…”
Section: Microprocessor Correctnessmentioning
confidence: 99%