000 08166nam a22006135i 4500
001 978-3-540-32030-2
003 DE-He213
005 20201213200849.0
007 cr nn 008mamaa
008 100319s2005 gw | s |||| 0|eng d
020 _a9783540320302
_9978-3-540-32030-2
024 7 _a10.1007/11560548
_2doi
050 4 _aQA76.9.L63
050 4 _aQA76.5913
050 4 _aQA76.63
072 7 _aUM
_2bicssc
072 7 _aUYF
_2bicssc
072 7 _aCOM051000
_2bisacsh
072 7 _aCOM036000
_2bisacsh
082 0 4 _a005.1015113
_223
100 1 _aBorrione, Dominique.
_eeditor.
245 1 0 _aCorrect Hardware Design and Verification Methods
_h[electronic resource] :
_b13th IFIP WG 10.5 Advanced Research Working Conference, CHARME 2005, Saarbrücken, Germany, October 3-6, 2005. Proceedings /
_cedited by Dominique Borrione, Wolfgang Paul.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2005.
300 _aXII, 412 p. Also available online.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3725
505 0 _aInvited Talks -- Is Formal Verification Bound to Remain a Junior Partner of Simulation? -- Verification Challenges in Configurable Processor Design with ASIP Meister -- Tutorial -- Towards the Pervasive Verification of Automotive Systems -- Functional Approaches to Design Description -- Wired: Wire-Aware Circuit Design -- Formalization of the DE2 Language -- Game Solving Approaches -- Finding and Fixing Faults -- Verifying Quantitative Properties Using Bound Functions -- Abstraction -- How Thorough Is Thorough Enough? -- Interleaved Invariant Checking with Dynamic Abstraction -- Automatic Formal Verification of Liveness for Pipelined Processors with Multicycle Functional Units -- Algorithms and Techniques for Speeding (DD-Based) Verification 1 -- Efficient Symbolic Simulation via Dynamic Scheduling, Don’t Caring, and Case Splitting -- Achieving Speedups in Distributed Symbolic Reachability Analysis Through Asynchronous Computation -- Saturation-Based Symbolic Reachability Analysis Using Conjunctive and Disjunctive Partitioning -- Real Time and LTL Model Checking -- Real-Time Model Checking Is Really Simple -- Temporal Modalities for Concisely Capturing Timing Diagrams -- Regular Vacuity -- Algorithms and Techniques for Speeding Verification 2 -- Automatic Generation of Hints for Symbolic Traversal -- Maximal Input Reduction of Sequential Netlists via Synergistic Reparameterization and Localization Strategies -- A New SAT-Based Algorithm for Symbolic Trajectory Evaluation -- Evaluation of SAT-Based Tools -- An Analysis of SAT-Based Model Checking Techniques in an Industrial Environment -- Model Reduction -- Exploiting Constraints in Transformation-Based Verification -- Identification and Counter Abstraction for Full Virtual Symmetry -- Verification of Memory Hierarchy Mechanisms -- On the Verification of Memory Management Mechanisms -- Counterexample Guided Invariant Discovery for Parameterized Cache Coherence Verification -- Short Papers -- Symbolic Partial Order Reduction for Rule Based Transition Systems -- Verifying Timing Behavior by Abstract Interpretation of Executable Code -- Behavior-RTL Equivalence Checking Based on Data Transfer Analysis with Virtual Controllers and Datapaths -- Deadlock Prevention in the Æthereal Protocol -- Acceleration of SAT-Based Iterative Property Checking -- Error Detection Using BMC in a Parallel Environment -- Formal Verification of Synchronizers -- A Parameterized Benchmark Suite of Hard Pipelined-Machine-Verification Problems -- Improvements to the Implementation of Interpolant-Based Model Checking -- High-Level Modelling, Analysis, and Verification on FPGA-Based Hardware Design -- Proving Parameterized Systems: The Use of Pseudo-Pipelines in Polyhedral Logic -- Resolving Quartz Overloading -- FPGA Based Accelerator for 3-SAT Conflict Analysis in SAT Solvers -- Predictive Reachability Using a Sample-Based Approach -- Minimizing Counterexample of ACTL Property -- Data Refinement for Synchronous System Specification and Construction -- Introducing Abstractions via Rewriting -- A Case Study: Formal Verification of Processor Critical Properties.
520 _aThisvolumeconstitutestheproceedingsofthe2005 Advanced Research Working C- ference on Correct Hardware-like Design and Veri?cation Methods. CHARME 2005 washeldattheVictor’sResidenz-Hotel,Saarbruck ¨ en,Germany,3–6October2005. CHARME2005wasthethirteenthinaseriesofworkingconferencesdevotedtothe developmentandtheuseofleading-edgeformaltechniquesandtoolsforthespeci?- tion, design and veri?cationof hardwareand hardware-likesystems. Previousconf- encesundertheCHARMEnamehavebeenheldinTurin(1991),Arles(1993),Fra- furt (1995), Montreal (1997), Bad Herrenalb (1999), Edinburgh (2001) and L’Aquila (2003).Prioreventsintheserieswerestartedintheearlydaysofformalhardwarev- i?cation,and wereheld undervariousnamesin Darmstadt (1984),Edinburgh(1985), Grenoble(1986),Glasgow (1988),and Leuven(1989).It is nowwell established that CHARMEtakesplaceonodd-numberedyears,androtatesprimarilyinEurope.Itisthe biennialcounterpartofitssisterconferenceFMCAD,whichhastakenplaceeveryeven yearintheUSAsince1996. CHARME 2005 was sponsored by the IFIP TC10/WG10.5 Working Group on Design and Engineering of Electronic Systems and its Special Interest Group SIG- CHARME. It was organized by the Computer Science Department of Saarland University. Thisyear,twokindsofcontributionsweresolicited:(i)fullpapers,describingor- inalresearchwork,intendedforanoralplenarypresentation,(ii)shortpapers,descr- ingongoinglessmatureresearchworkintendedforpresentationaspostersorresearch prototypedemonstrations. Two very long sessions were allocated to poster and int- active presentations, with the aim of giving an emphasis on the “working” aspect of the working conference, where discussion of new or un?nished results and feedback are an essential aspect of the event.The community was extremely responsiveto this viewpoint: we received a total number of 79 submitted papers, out of which 21 long contributionsand 18 short contributionswere accepted for presentationat the conf- enceandinclusioninthisvolume.Allpapersreceivedaminimumofthreereviews. For the conferenceprogram outside the refereed talks we put emphasis on the - latedtopicsoftoolintegrationandpervasivesystemveri?cation.Thedayprecedingthe workingconferencefeaturedhands-ondemonstrationsfornumerousveri?cationtools; italsofeaturedatutorialonsystemveri?cationbymembersoftheVerisoftproject.The overall program of CHARME 2005 included an invited keynote address by Wolfram B¨ uttner on industrial processor veri?cation and a round table discussion about mixed techniquesforverylargehardware-softwaresystemsinitiatedwithaninvitedpresen- tionbyMasaharuImaiandAkiraKitajima. A quality conference such as CHARME results from the work of many people. We wish to thank the membersof the ProgramCommittee and the externalreviewers fortheirhardworkinevaluatingthesubmissionsandinselectinghighqualitypapers.
650 0 _aComputer science.
650 0 _aComputer hardware.
650 0 _aSoftware engineering.
650 0 _aLogic design.
650 0 _aArtificial intelligence.
650 0 _aComputer aided design.
650 1 4 _aComputer Science.
650 2 4 _aLogics and Meanings of Programs.
650 2 4 _aComputer Hardware.
650 2 4 _aSoftware Engineering.
650 2 4 _aMathematical Logic and Formal Languages.
650 2 4 _aArtificial Intelligence (incl. Robotics).
650 2 4 _aComputer-Aided Engineering (CAD, CAE) and Design.
700 1 _aPaul, Wolfgang.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540291053
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3725
856 4 0 _uhttp://dx.doi.org/10.1007/11560548
912 _aZDB-2-SCS
912 _aZDB-2-LNC
950 _aComputer Science (Springer-11645)
999 _c13949
_d13949