2011
DOI: 10.1007/s00236-011-0142-y
|View full text |Cite
|
Sign up to set email alerts
|

Correct hardware synthesis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…This synthesis back end can seamlessly integrate with the proof-producing HOL4 to Verilog translator as it is based on the same Verilog semantics, and therefore creates verified translation from HOL4 circuit descriptions to synthesised Verilog netlists. Perna et al designed a formally verified translator from a deep embedding of Handel-C [Aubury et al 1996] into a deep embedding of a circuit [Perna and Woodcock 2012;Perna et al 2011]. Finally, Ellis [2008] used Isabelle to implement and reason about intermediate languages for software/hardware compilation, where parts could be implemented in hardware and the correctness could still be shown.…”
Section: Usable Toolmentioning
confidence: 99%
“…This synthesis back end can seamlessly integrate with the proof-producing HOL4 to Verilog translator as it is based on the same Verilog semantics, and therefore creates verified translation from HOL4 circuit descriptions to synthesised Verilog netlists. Perna et al designed a formally verified translator from a deep embedding of Handel-C [Aubury et al 1996] into a deep embedding of a circuit [Perna and Woodcock 2012;Perna et al 2011]. Finally, Ellis [2008] used Isabelle to implement and reason about intermediate languages for software/hardware compilation, where parts could be implemented in hardware and the correctness could still be shown.…”
Section: Usable Toolmentioning
confidence: 99%
“…In its original presentation, it describes nondeterministic sequential programming, the renement calculus, the algebra of programming, compilation of high-level languages, concurrency, communication, reactive processes, and higher-order programming [25]. Subsequently, it has been exploited in a diversity of areas such as component-based systems [49], hardware verication [40,39], and hardware/software co-design [2].…”
Section: Unifying Theories Of Programmingmentioning
confidence: 99%