A survey on assertion-based hardware verification
Hardware verification of modern electronic systems has been identified as a major
bottleneck due to the increasing complexity and time-to-market constraints. One of the major …
bottleneck due to the increasing complexity and time-to-market constraints. One of the major …
Mining hardware assertions with guidance from static analysis
S Hertz, D Sheridan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We present GoldMine, a methodology for generating assertions automatically in hardware.
Our method involves a combination of data mining and static analysis of the register transfer …
Our method involves a combination of data mining and static analysis of the register transfer …
Automatic extraction of assertions from execution traces of behavioural models
A Danese, T Ghasempouri… - 2015 Design, Automation …, 2015 - ieeexplore.ieee.org
Several approaches exist for specification mining of hardware designs. Most of them work at
RTL and they extract assertions in the form of temporal relations between Boolean variables …
RTL and they extract assertions in the form of temporal relations between Boolean variables …
Survey of machine learning for software-assisted hardware design verification: Past, present, and prospect
With the ever-increasing hardware design complexity comes the realization that efforts
required for hardware verification increase at an even faster rate. Driven by the push from …
required for hardware verification increase at an even faster rate. Driven by the push from …
Harm: a hint-based assertion miner
This article presents HARM, a tool to generate linear temporal logic (LTL) assertions starting
from a set of user-defined hints and the simulation traces of the design under verification …
from a set of user-defined hints and the simulation traces of the design under verification …
Survey on machine learning algorithms enhancing the functional verification process
The continuing increase in functional requirements of modern hardware designs means the
traditional functional verification process becomes inefficient in meeting the time-to-market …
traditional functional verification process becomes inefficient in meeting the time-to-market …
Isadora: Automated information flow property generation for hardware designs
Isadora is a methodology for creating information flow specifications of hardware designs.
The methodology combines information flow tracking and specification mining to produce a …
The methodology combines information flow tracking and specification mining to produce a …
Isadora: automated information-flow property generation for hardware security verification
Isadora is a specification mining tool for creating information-flow properties for hardware.
Isadora combines hardware information-flow tracking and specification mining to produce …
Isadora combines hardware information-flow tracking and specification mining to produce …
[PDF][PDF] Machine-guided solution to mathematical word problems
B Amnueypornsakul, S Bhat - Proceedings of the 28th Pacific Asia …, 2014 - aclanthology.org
Mathematical word problems (MWP) test critical aspects of reading comprehension in
conjunction with generating a solution that agrees with the “story” in the problem. In this …
conjunction with generating a solution that agrees with the “story” in the problem. In this …
Mining security critical linear temporal logic specifications for processors
This paper presents UNDINE, a tool to automatically generate security critical Linear
Temporal Logic (LTL) properties of processor architectures. UNDINE handles complex …
Temporal Logic (LTL) properties of processor architectures. UNDINE handles complex …