Proceedings International Conference on Computer Design. VLSI in Computers and Processors (Cat. No.98CB36273)
DOI: 10.1109/iccd.1998.727079
|View full text |Cite
|
Sign up to set email alerts
|

Theorem proving guided development of formal assertions in a resource-constrained scheduler for high-level synthesis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…Our work is related to translation validation [19], [33], [42], [46], [47], [53], [54], relational approaches to reasoning about programs [5], [7], [15], [28], [35], CSP refinement checking [13], [27], [39], [51], and HLS verification [2], [14], [31], [34], [41]. We now discuss each area in more detail.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our work is related to translation validation [19], [33], [42], [46], [47], [53], [54], relational approaches to reasoning about programs [5], [7], [15], [28], [35], CSP refinement checking [13], [27], [39], [51], and HLS verification [2], [14], [31], [34], [41]. We now discuss each area in more detail.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques like correctness-preserving transformations [14], formal assertions [41], symbolic simulation [3], and relational approaches for functional equivalence of finite state machines with datapaths [29]- [32] have been used to validate the scheduling step of HLS. In contrast to these approaches our algorithm can handle most of the transformations currently being used for HLS in an uniform and modular framework.…”
Section: Hls Verificationmentioning
confidence: 99%
“…Moreover, the model must be sufficiently small. Narasimhan et al [17] applies theorem proving to verify the correctness of the FDLS scheduling strategy. Our approach is distinct from these by following the "refinement method" where we reason with a simpler model and verify that a more efficient strategy refines it.…”
Section: Figure 4 Tla Proof Rulesmentioning
confidence: 99%
“…Related work: According to [12], synthesis-verification maybe divided into pre-synthesis verification of synthesisalgorithms (e.g., [14]), formal synthesis where the constructive steps are embedded into a theorem prover (e.g., [3]), and post-synthesis verification where the synthesized results are verified afterwards (e.g., [13]). While most methods of post-synthesis verification use theorem proving techniques, a graph-based method was proposed in [8].…”
Section: Introductionmentioning
confidence: 99%