Exploiting Reversible Computing for Verification

被引:0
|
作者
Burgholzer, Lukas [1 ]
Wille, Robert [2 ,3 ]
机构
[1] Johannes Kepler Univ Linz, Linz, Austria
[2] Tech Univ Munich, Chair Design Automat, Munich, Germany
[3] Software Competence Ctr Hagenberg GmbH, Hagenberg, Austria
基金
欧洲研究理事会;
关键词
CHECKING;
D O I
10.1145/3566097.3567914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, the verification of classical circuits poses a severe challenge for the design of circuits and systems. While the underlying (exponential) complexity is tackled in various fashions (simulation-based approaches, emulation, formal equivalence checking, fuzzing, model checking, etc.), no "silver bullet" has been found yet which allows to escape the growing verification gap. In this work, we entertain and investigate the idea of a complementary approach which aims at exploiting reversible computing. More precisely, we show the potential of the reversible computing paradigm for verification, debunk misleading paths that do not allow to exploit this potential, and discuss the resulting consequences for the development of future, complementary design and verification flows. An extensive empirical study (involving more than 30 million simulations) confirms these findings. Although this work cannot provide a fully-fledged realization yet, it may provide the basis for an alternative path towards overcoming the verification gap.
引用
收藏
页码:429 / 435
页数:7
相关论文
共 50 条
  • [1] Exploiting "Architecture for Verification" to Streamline the Verification Process
    Whipp, Dave
    [J]. DAC: 2009 46TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2009, : 212 - 215
  • [2] Exploiting Reversible Computing for Latent-Fault-Free Error Detecting/Correcting CMOS Circuits
    Altun, Mustafa
    Parvin, Sajjad
    Cilasun, M. Husrev
    [J]. IEEE ACCESS, 2018, 6 : 74475 - 74484
  • [3] Reversible computing
    De Vos, A
    [J]. PROGRESS IN QUANTUM ELECTRONICS, 1999, 23 (01) : 1 - 49
  • [4] Exploiting Modularity for Ontology Verification
    Grueninger, Michael
    Hahmann, Torsten
    Katsumi, Megan
    [J]. MODULAR ONTOLOGIES, 2011, 230 : 55 - 62
  • [5] Exploiting Refactoring in Formal Verification
    Yin, Xiang
    Knight, John
    Weimer, Westley
    [J]. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 53 - 62
  • [6] Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction
    Lin, Jiang-Yi
    Chen, Yu
    Chang, Chin-Chen
    Hu, Yu-Chen
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) : 25855 - 25872
  • [7] Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction
    Jiang-Yi Lin
    Yu Chen
    Chin-Chen Chang
    Yu-Chen Hu
    [J]. Multimedia Tools and Applications, 2019, 78 : 25855 - 25872
  • [8] Exploiting Randomness in Stochastic Computing
    Ting, Paishun
    Hayes, John P.
    [J]. 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2019,
  • [9] REVERSIBLE AND ENDOREVERSIBLE COMPUTING
    DEVOS, A
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 1995, 34 (11) : 2251 - 2266
  • [10] Reversible Monadic Computing
    Heunen, Chris
    Karvonen, Martti
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2015, 319 : 217 - 237