2001
DOI: 10.1109/43.905681
|View full text |Cite
|
Sign up to set email alerts
|

Timed circuit verification using TEL structures

Abstract: Recent design examples have shown that significant performance gains are realized when circuit designers are allowed to make aggressive timing assumptions. Circuit correctness in these aggressive styles is highly timing dependent and, in industry, they are typically designed by hand. In order to automate the process of designing and verifying timed circuits, algorithms for their synthesis and verification are necessary. This paper presents timed event/level (TEL) structures, a specification formalism for timed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2002
2002
2011
2011

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…This chapter discusses several model checking tools for hybrid systems and AMS circuit verification. Next, this chapter introduces a set of algorithms to perform reachability analysis of constant rate LHPNs using DBMs based upon a reachability analysis algorithm for analyzing timed systems [25,26]. This chapter includes an error trace generation method for LHPNs and concludes with an example of reachability analysis on the motivating example.…”
Section: Warping Dbmsmentioning
confidence: 99%
See 1 more Smart Citation
“…This chapter discusses several model checking tools for hybrid systems and AMS circuit verification. Next, this chapter introduces a set of algorithms to perform reachability analysis of constant rate LHPNs using DBMs based upon a reachability analysis algorithm for analyzing timed systems [25,26]. This chapter includes an error trace generation method for LHPNs and concludes with an example of reachability analysis on the motivating example.…”
Section: Warping Dbmsmentioning
confidence: 99%
“…If a failure trace has been fired or deadlock is found a pair of error traces are created and the current state space and error traces are returned (lines 16-18 and 20-22, respectively). If the state set has been seen before, an edge is added to the graph, the stack is popped and the loop continues (lines [23][24][25][26]. If the stack is empty, the reachable state space has been found and is returned with an empty error trace (lines 27-28).…”
Section: Reachability Analysis Of Lhpns Using Dbmsmentioning
confidence: 99%
“…Our analysis method uses zones defined using difference bound matrices (DBMs) [7] to represent the continuous portion of the state space. Our methodology is based upon one for analyzing timed systems [2,3] with extensions necessary to deal with continuous quantities changing at variable rates. The state sets are represented with the tuple 蠄 = M, S, Q, R, I, Z where:…”
Section: Analysis Of Lhpnsmentioning
confidence: 99%
“…this kind of timing constraints is less restrictive than metric timing constraints 1 [6,7] and easier to validate than relative timing constraints 2 [19,21]. This additional freedom can be used to select more aggressive delays for larger performance gains.…”
Section: Introductionmentioning
confidence: 97%