In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance,...
详细信息
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance, VIS depends on the translator vl2mv to compile Verilog into the intermediate format BLIF-MV first, and then extracts the FSM (Finite State Models) from it instead of the direct Verilog source code. However, Verilog and VHDL are the most common used hardware description languages for large scale integrated circuits. It is necessary if the source code could be used directly, rather than an intermediate format. We notice that synthesizable Verilog is well-structured which can be represented in SSA (Static Single Assignment) form. In this paper, we describe a method that extracts formal model directly from Verilog source code by converting the code to SSA form. With this method, we have implemented a prototype system that extracts formal model of Verilog programs. We also prove the conversion function-preserving by translating SSA back to Verilog and checking its equivalence with the primary design. To ensure correctness and robustness, we have tested our system with ISCAS and picoJava-II, a specification of microprocessor, and the experimental results on these realistic circuits show that the conversion procedure is function-preserving. Moreover, we take it as the front-end of CEC (Combinational Equivalence Checking) and demonstrate the formal model extracted with our method can be exploited efficiently in CEC.
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporti...
详细信息
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporting tag ownership transfer is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the backend server and is suitable for the low-cost RFID systems. The security and performance of the proposed protocol are analyzed as well.
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,...
详细信息
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions, and prove that these topological relations are exclusive and complete. Moreover, we obtained 32406 topological relations in practice by programs, and we illustrate that the 16-intersections matrix model has stronger expressive ability than the topological relations given by RCC-5 in pairs.
knowledge Reformulation and Abstraction model have been proposed to be a model of representation change that includes both syntactic reformulation and abstraction. We furthermore extended the process on the basis of t...
详细信息
knowledge Reformulation and Abstraction model have been proposed to be a model of representation change that includes both syntactic reformulation and abstraction. We furthermore extended the process on the basis of the ontology classes and the mappings between them and particularly the concept of goal perception is proposed to formalize the goal-based hierarchical process of workflow abstraction modeling. This paper furthermore introduces system-centered ontology to formalize the hierarchical workflow modeling process. We propose the concept of workflow fragment-based ontology class and provide its hierarchical abstraction process respectively from the object-based perspective and the flow-based perspective, i.e., workflow fragment abstraction and workflow fragment aggregation. Workflow fragment-based ontology class gives the mechanism of system-centered knowledge learning, sharing and reuse to save the cost of redesign and remodeling of workflow models. The hierarchical workflow abstraction model based on workflow fragments (from the perspective on the basis of system-centered ontology) is constructed which is more abstract than based on object-centered and simplifies the reasoning.
Abstraction is a pervasive behavior of people's perception, conceptualization and reasoning. The knowledge reformulation and abstraction model has been introduced to formalize the workflow abstraction modeling pro...
详细信息
Abstraction is a pervasive behavior of people's perception, conceptualization and reasoning. The knowledge reformulation and abstraction model has been introduced to formalize the workflow abstraction modeling process which is an iterative learning process of "Perception-Abstraction". The concept of domain is introduced into the general knowledge reformulation and abstraction model to extensionally extend the reasoning ability. In this paper, we provide the process of multi-domain workflow abstraction modeling on the basis of the extended general knowledge reformulation and abstraction model. We think of the steps of the workflow as multi-domain tasks, i.e., they can play different roles in different workflows. By perceiving the tasks that work in multiple domains, we define the multi-domain tasks and through them build the multi-domain relations between different workflow, so that the multi-domain workflow perception is constructed which shows more reasoning perspectives than the single-domain workflow model.
This paper presents an efficient technique for processing of 3D meshed surfaces via spherical wavelets. More specifically, an input 3D mesh is firstly transformed into a spherical vector signal by a fast low distortio...
详细信息
This paper presents an efficient technique for processing of 3D meshed surfaces via spherical wavelets. More specifically, an input 3D mesh is firstly transformed into a spherical vector signal by a fast low distortion spherical parameterization approach based on symmetry analysis of 3D meshes. This signal is then sampled on the sphere with the help of an adaptive sampling scheme. Finally, the sampled signal is transformed into the wavelet domain according to spherical wavelet transform where many 3D mesh processing operations can be implemented such as smoothing, enhancement, compression, and so on. Our main contribution lies in incorporating a fast low distortion spherical parameterization approach and an adaptive sampling scheme into the frame for pro- cessing 3D meshed surfaces by spherical wavelets, which can handle surfaces with complex shapes. A number of experimental ex- amples demonstrate that our algorithm is robust and efficient.
In this paper, based on the newly introduced mappings ξi (x, yi) ∈ Rn, i = 1, , m and ηi (x, zj) ∈ Rn, j = 1, , l, using the idea of homotopy methods, we propose a homotopy interior point method for solving the op...
详细信息
An imbalanced data classification algorithm named as SBoost is proposed. SBoost regards the decision tree as a weak classifier. Only the instances that their prediction value is more than the threshold are updated wit...
详细信息
An imbalanced data classification algorithm named as SBoost is proposed. SBoost regards the decision tree as a weak classifier. Only the instances that their prediction value is more than the threshold are updated with their weights in every iteration. At the beginning of each iteration, SBoost makes use of data generation method to add synthetic minority class instances in order to balance training information. After the sub-classifier is formed, the algorithm deletes the synthetic instances that are not correctly classified. This paper puts forwards the theoretical analysis of training error bound. The experimental results show that SBoost has advantages on imbalanced data classification problem.
Clustering semi-structured dataset is a hot research topic recent years. In this paper, we proposed an algorithm named LESC to cluster XML documents collection by the leaf elements. First, we discuss the basic princip...
详细信息
A performance evaluation model, weighted AUC (wAUC), is proposed to determine a better way to measure the imbalanced data learning classifiers. When computing the weighted area under the ROC curve, weights vary with t...
详细信息
暂无评论