Modeling and Veriication of Isa Implementations Computation Structures Group Memo 400 (a) Modeling and Veriication of Isa Implementations
نویسنده
چکیده
We propose a method to precisely model implementations of Instruction Set Ar-chitectures (ISA) using term rewriting systems (TRS). Our method facilitates understanding of important micro-architectural diierences without delving into low-level implementation details. More importantly, the use of TRS allows us to prove rigorously the equivalence of diierent implementations. We rst deene AX, a simple RISC ISA, by specifying its operational semantics using a simple in-order execution model. We then give an AX implementation which uses register renaming and permits out-of-order instruction execution. The equivalence of the two models is proved by showing that the two TRS's can simulate each other.
منابع مشابه
Design and Veriication of Speculative Processors Computation Structures Group Memo 400 (b) Design and Veriication of Speculative Processors
We deene AX, a simple RISC instruction set, by specifying its operational semantics using term rewriting systems (TRS). We then give another TRS that models an AX implementation which permits out-of-order and speculative instruction execution. The correctness of the speculative implementation is proved by showing that the two TRS's can simulate each other with regards to some observation functi...
متن کاملMPI- and CUDA- implementations of modal finite difference method for P-SV wave propagation modeling
Among different discretization approaches, Finite Difference Method (FDM) is widely used for acoustic and elastic full-wave form modeling. An inevitable deficit of the technique, however, is its sever requirement to computational resources. A promising solution is parallelization, where the problem is broken into several segments, and the calculations are distributed over different processors. ...
متن کاملTrace Table Based Approach forPipelined Microprocessor Veri cationJun Sawada
This paper presents several techniques for formally verifying pipelined microprocessor implementations that contain out-of-order execution and dynamic resolution of data-dependent hazards. Our principal technique models the trace of executed instructions using a table-based representation called a MAETT. We express invariant properties of pipelined implementations by specifying relations betwee...
متن کاملInheritance under Participation Constraints
Traditional database systems have been successful in handling large amounts of data but lack mechanisms for schema derivations and schema veriication. In this paper, we propose (i) structures that carry expressive and useful information on the database schema, (ii) a set of inference rules for schema derivations, and (iii) a mechanism for discovering contradictory schema declarations. To this e...
متن کاملHigher-level Speciication and Veriication with Bdds
Currently, many are investigating promising veriication methods based on Boolean decision diagrams (BDDs). Using BDDs, however, requires modeling the system under veriication in terms of Boolean formulas. This modeling can be diicult and error-prone, especially when dealing with constructs like arithmetic, sequential control ow, and complex data structures. We present new techniques for automat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998