1995
DOI: 10.1007/3-540-60029-9_50
|View full text |Cite
|
Sign up to set email alerts
|

Verification of asynchronous circuits by BDD-based model checking of Petri nets

Abstract: This paper presents a methodology for the veri cation of speed-independent asynchronous circuits against a Petri net speci cation. The technique is based on symbolic reachability analysis, modeling both the speci cation and the gate-level network behavior by m e a n s of boolean functions. These functions are e ciently handled by u s i n g Binary Decision Diagrams. Algorithms for verifying the correctness of designs, as well as several circuit properties are proposed. Finally, t h e applicability o f o u r v e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
43
0

Year Published

2001
2001
2008
2008

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 62 publications
(44 citation statements)
references
References 16 publications
1
43
0
Order By: Relevance
“…The number in parenthesis indicates the number of stages in case of pipelines. We provide results for BFS traversal (BFS), chained traversal using a greedy ordering strategy (C Greedy) [14], and a token-traverse chained strategy (C Token) [16]. Our goal when presenting these experiments is to demonstrate the significant impact that the chaining methodology has on the efficiency of traversal.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The number in parenthesis indicates the number of stages in case of pipelines. We provide results for BFS traversal (BFS), chained traversal using a greedy ordering strategy (C Greedy) [14], and a token-traverse chained strategy (C Token) [16]. Our goal when presenting these experiments is to demonstrate the significant impact that the chaining methodology has on the efficiency of traversal.…”
Section: Resultsmentioning
confidence: 99%
“…These observations have suggested alternative traversal algorithms, named chaining [14,15]. Chaining applies the individual TRs of events in a predetermined order such that the number of new states generated at each step is maximized.…”
Section: Reachability Analysismentioning
confidence: 99%
“…Variant a is a naive algorithm, b [2] and c [4] are algorithms from the literature. Variant d, together with automatic optimizations, is our contribution and will be presented in the next section.…”
Section: Transitive Closure : State Of the Artmentioning
confidence: 99%
“…Note that this algorithm no longer explores states in a strict BFS order, as when t 2 is applied after t 1 , it may discover successors of states obtained by the application of t 1 . The clusters are defined in [4] using structural heuristics that rely on the Petri net definition of the model, and try to maximize independence of clusters. This may allow to converge faster than in a or b which will need as many iterations as the state-space is deep.…”
Section: Transitive Closure : State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation