Exploiting constraints in transformation-based verification

被引:0
|
作者
Mony, H [1 ]
Baumgartner, J [1 ]
Aziz, A [1 ]
机构
[1] Univ Texas, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The modeling of design environments using constraints has gained widespread industrial application, and most verification languages include constructs for specifying constraints. It is therefore critical for verification tools to intelligently leverage constraints to enhance the overall verification process. However, little prior research has addressed the applicability of transformation algorithms to designs with constraints. Even when addressed, prior work lacks optimality and in cases violates constraint semantics. In this paper, we introduce the theory and practice of transformation-based verification in the presence of constraints. We discuss how various existing transformations, such as redundancy removal and retiming, may be optimally applied while preserving constraint semantics, including dead-end states. We additionally introduce novel constraint elimination, introduction, and simplification techniques that preserve property checking. We have implemented all of the techniques proposed in this paper, and have found their synergistic application to be critical to the automated solution of many complex verification problems with constraints.
引用
收藏
页码:269 / 284
页数:16
相关论文
共 50 条
  • [21] Analyzing transformation-based simulation metamodels
    Irizarry, MD
    Kuhl, ME
    Lada, EK
    Subramanian, S
    Wilson, JR
    [J]. IIE TRANSACTIONS, 2003, 35 (03) : 271 - 283
  • [22] A TRANSFORMATION-BASED METHOD FOR LOOP FOLDING
    LEE, TF
    WU, ACH
    LIN, YL
    GAJSKI, DD
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 1994, 13 (04) : 439 - 450
  • [23] A Transformation-based Model of Malware Derivation
    Walenstein, Andrew
    Lakhotia, Arun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 17 - 25
  • [24] Transformation-based structure model evolution
    Büttner, F
    [J]. SATELLITE EVENTS AT THE MODELS 2005 CONFERENCE, 2006, 3844 : 339 - 340
  • [25] Transformation-Based Operationalization of Graph Languages
    Weinell, Erhard
    [J]. GRAPH TRANSFORMATIONS, ICGT 2008, 2008, 5214 : 520 - 522
  • [26] Transformation-based framework for record matching
    Arasu, Arvind
    Chaudhuri, Surajit
    Kaushik, Raghav
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 40 - 49
  • [27] Transformation-Based Spatial Partition Join
    Lee, MJ
    Han, WS
    Whang, KY
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (06): : 355 - 362
  • [28] Transformation-based Learning for Semantic parsing
    Jurcicek, F.
    Gasic, M.
    Keizer, S.
    Mairesse, E.
    Thomson, B.
    Yu, K.
    Young, S.
    [J]. INTERSPEECH 2009: 10TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2009, VOLS 1-5, 2009, : 2683 - 2686
  • [29] Electrodynamics of transformation-based invisibility cloaking
    Baile Zhang
    [J]. Light: Science & Applications, 2012, 1 : e32 - e32
  • [30] Relational Transformation-based Tagging for Activity Recognition
    Landwehr, Niels
    Gutmann, Bernd
    Thon, Ingo
    De Raedt, Luc
    [J]. FUNDAMENTA INFORMATICAE, 2008, 89 (01) : 111 - 129