Electronic Design Automation for IC Implementation, Circuit Design, and Process Technology 2016
DOI: 10.1201/b19714-6
|View full text |Cite
|
Sign up to set email alerts
|

Equivalence Checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 56 publications
0
0
0
Order By: Relevance
“…In the BLOCKCUBE(q, Q, F k ) procedure, described in Algorithm 7, the queue of proof obligations is initialized with (q, k), encoding the fact that q must be blocked in F k (line 2). Then, proof obligations are iteratively extracted from the queue and discharged (lines [3][4][5][6][7][8][9][10][11][12][13][14].…”
Section: Ic3mentioning
confidence: 99%
See 1 more Smart Citation
“…In the BLOCKCUBE(q, Q, F k ) procedure, described in Algorithm 7, the queue of proof obligations is initialized with (q, k), encoding the fact that q must be blocked in F k (line 2). Then, proof obligations are iteratively extracted from the queue and discharged (lines [3][4][5][6][7][8][9][10][11][12][13][14].…”
Section: Ic3mentioning
confidence: 99%
“…During the last two decades, research in the field of formal verification has led to the development of many techniques. Such techniques can be subdivided into three main approaches to formal verification: theorem proving [4,5], equivalence checking [6] and model checking [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Practical EC approaches typically assume a known or guessed correspondence between the storage elements of the circuit, so that the checking can be reduced to a Combinational Equivalence Checking (CEC) problem. CEC is a mature technology, with known limitations but also with tools and solutions for practical industrial cases [1].…”
Section: Formal Verification Background and Related Workmentioning
confidence: 99%
“…This approach is used by many academic and commercial tools, as it avoids state explosion. The mapping of storage elements can be derived from naming conventions or it can be automated [1].…”
Section: Formal Verification Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation