1998
DOI: 10.1007/bfb0054169
|View full text |Cite
|
Sign up to set email alerts
|

Efficient modeling of memory arrays in symbolic ternary simulation

Abstract: Abstract. This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variables used to characterize the initial state of the memory is proportional to the number of distinct symbolic memory locations accessed. The behavioral model provides a conservative approximation of the replaced memory array, while allowing the address and control inputs of the memory to accept symbolic ternary values. Memory s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

1998
1998
2015
2015

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…This ensures that the Boolean expressions for hard_match and soft_match will not be true simultaneously. For an implementation of the Read operation that yields more precise results, and for a way to optimize the Write operation, the reader is referred to [19].…”
Section: Implementation Of Memory Write and Read Operationsmentioning
confidence: 99%
See 2 more Smart Citations
“…This ensures that the Boolean expressions for hard_match and soft_match will not be true simultaneously. For an implementation of the Read operation that yields more precise results, and for a way to optimize the Write operation, the reader is referred to [19].…”
Section: Implementation Of Memory Write and Read Operationsmentioning
confidence: 99%
“…A ternary version of the EMM is presented in [19], where the memory address and control inputs are allowed to accept symbolic ternary values, while the EMM will behave as a conservative approximation to the replaced memory array. Conservative approximation means that false positive verification results are guaranteed not to occur, although false negative verification results are possible.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nested ITEs were first used to eliminate uninterpreted functions and uninterpreted predicates in Velev and Bryant (1998c), where bit-level functional units were abstracted with read-only instances of an Efficient Memory Model (Velev and Bryant, 1998a;Velev and Bryant, 1998b)-developed for use in symbolic simulation as a behavioural abstraction of memories, and later adopted in verification tools by Innologic Systems (Hasteer, 1999), and Synopsys (Kölbl et al, 2002).…”
Section: Related Workmentioning
confidence: 99%
“…It is based on the observation that a single execution sequence typically accesses only a limited number of distinct symbolic locations. While the EMM presented in [13] assumes simulation over symbolic binary values, our later work [14] allows the EMM to accept symbolic ternary values at its address and control inputs, while providing a conservative approximation of the replaced memory array. Conservative approximation means that false positive verification results are guaranteed not to occur, although false negative verification 2 results are possible.…”
Section: Introductionmentioning
confidence: 99%