This paper describes a model-based functional test generation method for hardware designs. The main principles are as follows. Two models are extracted from an HDL description: a functional model, which represents the...
详细信息
ISBN:
(纸本)9781509006939
This paper describes a model-based functional test generation method for hardware designs. The main principles are as follows. Two models are extracted from an HDL description: a functional model, which represents the design under scrutiny, and a coverage model, which represents a set of testing goals. Each goal is specified in the negative form to force a model checker to find a counterexample - an execution of the functional model that violates the given property, and thus reaches the testing goal. The coverage criterion is defined on top of extended finite state machines derived from a design's source code. Experiments have shown the method flexibility and effectiveness.
The paper presents an experimental evaluation of test generation methods for digital circuits. Two methods are considered: an EFSM-based one, aimed at the code coverage of high-level (RTL) descriptions, and an equival...
详细信息
ISBN:
(纸本)9781509006939
The paper presents an experimental evaluation of test generation methods for digital circuits. Two methods are considered: an EFSM-based one, aimed at the code coverage of high-level (RTL) descriptions, and an equivalence-checking based on low-level (gate) description. High-level code and low-level fault coverage are measured for generated tests. Low-level mutants were generated for several fault models. Experiments have been performed for a subset of ITC'99 benchmarks. The results show that in most cases, the mutant coverage remains rather low for RTL tests. Vice versa, low-level tests have lower or the same RTL code coverage as high-level ones.
In the first issue of Nature 2015, Google DeepMind published a paper “Human-level control through deep reinforcement learning.” Furthermore, in the first issue of Nature 2016, it published a cover paper “Master...
详细信息
In the first issue of Nature 2015, Google DeepMind published a paper “Human-level control through deep reinforcement learning.” Furthermore, in the first issue of Nature 2016, it published a cover paper “Mastering the game of Go with deep neural networks and tree search” and proposed the computer Go program, AlphaGo. In March 2016, AlphaGo beat the world’s top Go player Lee Sedol by 4:1. This becomes a new milestone in artificial intelligence history, the core of which is the algorithm of deep reinforcement learning (RL).
Localization of wireless nodes within the IoT received much attention lately. However, strong constraints on power consumption, scalability, and complexity of the nodes pose a big challenge for localization techniques...
详细信息
ISBN:
(纸本)9781509024254
Localization of wireless nodes within the IoT received much attention lately. However, strong constraints on power consumption, scalability, and complexity of the nodes pose a big challenge for localization techniques. This paper presents a concept for energy-efficient low-complexity localization based on Phase Difference of Arrival (PDoA). Besides a novel method for reference transmitter selection we propose a waveform, well-suited for PDoA measurements, and evaluate its ranging performance. We compare multiple signal classification (MUSIC), linear fitting, and mean phase difference and compare their estimation variance to the Cramer Rao Lower Bound (CRLB). Our system concept allows for the mitigation of near-far effects for reference and tag signals at the receiver nodes, and an efficient implementation of a wideband frequency hopping scheme.
This paper presents a memory model with nonoverlapping memory areas (regions) for the deductive verification of C programs. This memory model uses a core language that supports arbitrary nesting of structures, unions,...
详细信息
This paper presents a memory model with nonoverlapping memory areas (regions) for the deductive verification of C programs. This memory model uses a core language that supports arbitrary nesting of structures, unions, and arrays into other structures and allows reducing the number of user-provided annotations as a result of region analysis. This paper also describes semantics of the core language and normalizing transformations for translating an input annotated C program into a program in the core language. In addition, an encoding is proposed for modeling the memory state of a core-language program with logical formulas as described by the model semantics of the core language. For the model semantics, the soundness and completeness theorems are proved. Additional constraints on the typing context of the core-language terms are described that determine the result of the region analysis enabling the complete modeling of a limited class of programs without using additional annotations. A proof sketch for the theorem stating completeness of the proposed region analysis for a limited class of programs is presented.
The paper presents a target analyzable language used for verification of real-world production GNU C programs (Linux kernel modules). The language represents an extension of the existing intermediate language used by ...
详细信息
The paper presents a target analyzable language used for verification of real-world production GNU C programs (Linux kernel modules). The language represents an extension of the existing intermediate language used by the Jessie plugin for the Frama-C static analysis framework. Compared to the original Jessie, the extension is fully compatible with the C semantics of arrays, initially supports discriminated unions and prefix (hierarchical) structure pointer casts and provides a limited, but reasonable support for low-level pointer casts (reinterpretations of the underlying bytes of memory). The paper describes the approaches to translation of the original C code into the analyzable intermediate language and of the intermediate language into Why3ML i.e. the input language of the Why3 deductive verification platform.
This paper proposes a new object model of data for the in-depth analysis of network traffic. In contrast to the model used by most modern network analyzers (for example, Wireshark and Snort), the proposed model suppor...
详细信息
This paper proposes a new object model of data for the in-depth analysis of network traffic. In contrast to the model used by most modern network analyzers (for example, Wireshark and Snort), the proposed model supports data stream reassembling with subsequent parsing. The model also provides a convenient universal mechanism for binding parsers, thus making it possible to develop completely independent parsers. Moreover, the proposed model allows processing modified-compressed or encrypted-data. This model forms the basis of the infrastructure for the in-depth analysis of network traffic.
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature instability (NBTI) induced aging untied from the limitations of its modelling. The cost-ef...
详细信息
ISBN:
(纸本)9781509006939
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature instability (NBTI) induced aging untied from the limitations of its modelling. The cost-effective approach exploits a simple property of a randomized design, i.e., the equalized signal probability and switching activity at gate inputs. The techniques considered for structural design randomization involve both the hardware architecture and embedded software layers. Ultimately, the proposed approach aims at extending the reliable lifetime of nanoelectronic systems.
Introduction Infertility is not only a medical condition and its impact in mental health is well established. Although most couples facing fertility problems and the demands of medical treatment are able to adjust, so...
详细信息
Introduction Infertility is not only a medical condition and its impact in mental health is well established. Although most couples facing fertility problems and the demands of medical treatment are able to adjust, some of them may show psychological difficulties with clinical relevance, such as depression and anxiety. The Mindfulness Based Program for Infertility (MBPI) is a group intervention designed for infertile women and data from its efficacy study revealed impact in depressive symptoms reduction as well as in internal and external shame, entrapment and defeat. Based on the MBPI, a mindfulness app targeting infertile patients was developed - the MindfulSpot. Aims This study addresses the MindfulSpot development. Methods The MindfulSpot is a prototype mobile app, which seeks to offer the chance of practicing mindfulness in a comfortable and accessible way. This app covers informative audio and written texts. The audio contents correspond to mindfulness formal practices and suggestions for informal practice, making possible its use throughout different moments of the day. Beyond the practices mentioned above, users are invited to explore the informative menu, including information on the impact that infertility may have in several aspects of the patients’ lives. Results The efficacy of the MindfulSpot is still under analysis and results are expected to be available soon. Conclusions The MindfulSpot was designed as a medium for training mindfulness skills and it includes useful information regarding specific aspects of the emotional impact of infertility. Additionally to its independent use, it may also be used as a support tool of the MBPI.
This paper considers the problem of the deductive verification of the Linux kernel code that is concurrent and accesses shared data. The presence of shared data does not allow applying traditional deductive verificati...
详细信息
This paper considers the problem of the deductive verification of the Linux kernel code that is concurrent and accesses shared data. The presence of shared data does not allow applying traditional deductive verification techniques, so we consider how to verify such a code by proving its compliance to a given specification of a certain synchronization discipline. The approach is illustrated by the examples of a spinlock specification and a simplified specification of the read-copy-update (RCU) API.
暂无评论