8 Conclusions and Future Work
نویسندگان
چکیده
[5] M. Mutz. Using the HOL theorem proving environment for proving the correctness of term rewriting rules reducing terms of sequential behavior. and automating hardware proofs in a higher-order theorem-proving environment. In this paper, an approach to the formal synthesis of verification-friendly hardware structures has been presented. Having applied standard scheduling and allocation algorithms , known from high-level synthesis, an implementation description in a HDL-like language results. Its semantics is given directly as a compsition of handshake circuits-based on a synchronous handshake protocol. During the composition of these handshake circuits, a set of correctness theorems is derived which justifies the correctness of the specified circuit. Hence the correctness of scheduling and allocation, performed outside the formal framework, is checked. If during the specification phase, the designer's key ideas are provided via loop invariants, then all correctness proofs are done automatically, provided that decidable domain like bitvectors have been used. In case of more complex data types, proof obligations on the data domain are derived automatically, which have then to be justified otherwise, e.g. by manual proofs. The approach is well suited for data driven applications, which are used in safety critical environments. For pure controller circuits, other approaches are better suited, e.g. by performing a post-verification based on model checking. Using our approach, no time consuming post verification step is necessary to achieve correctness statements on the resulting circuits. Obviously, the handshake module paradigm leads in some cases to suboptimal hardware solutions. We are currently investigating optimization strategies at higher abstraction levels like operator folding and low level techniques like multilevel logic minimization, FSM minimization and retiming to reduce hardware costs. Circuit Name Time in seconds Table 7-1: Runtimes of different benchmark circuits overall behavior is not changed if the intermediate storage of the combinational results of Add is missing.
منابع مشابه
I-20: Towards The Transparent Embryo: Dynamics and Ethics of Comprehensive Preimplantation Genetic Screening
Background: To study the ethical aspects of comprehensive preimplantation genetic screening (PGS) through microarrays and whole genome sequencing Materials and Methods: In order to pinpoint ethical issues regarding comprehensive embryo screening we have first investigated the technical and moral issues by organizing a campus meeting with experts and by a literature study. Subsequently we have i...
متن کاملResearch Trend, Career Preferences and its Effective Factors among Undergraduate Medical Students in Jinnah Sind Medical University, Pakistan
Background: Research at undergraduate and graduate level is important in deciding career fields and future profession. The undergraduate studies are greatly enriched by doing research work. This study assess research trends among medical students by evaluating their research career choices, factors influencing their research career preferences and future plans at Jinnah Sind Medical University ...
متن کاملInvestigating the Impact of Environmental Poverty on Criminal Behavior of Young People in Marginal Areas
This study was examined to investigate the impact of environmental poverty on the criminal behavior of young people in marginal areas. The population of this study included all the youths in the marginalized schools of Isfahan. Sampling was done randomly. The sample size includes 358 students in marginalized areas. For youth with high PC, significant factors included high levels of attitudes to...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملEffects of Job Characteristics on Counterproductive Work Behavior among Production Employees: Malaysian Experience
This study seeks to investigate the impact of job characteristics on counterproductive work behaviour (CWB). Three forms of CWB are identified: interpersonal CWB, production CWB, and property CWB. The regression analysis carried out on a sample of 355 employees showed mixed results. Job significant demonstrated a significant and negative relationship with production CWB. The relationship betw...
متن کامل