E ectiveness Evaluation of the Bu er - Oriented MicroarchitectureValidation
نویسندگان
چکیده
In this paper, we evaluate the eeectiveness of the buuer-oriented microarchitecture validation methodology 1, 4, 5]. A list of design faults suggested by our industrial collaborator 2, 3] is used and investigated to determine if they can be detected by our generated validation sequences. Two metrics are used to determine the detection of the design faults: Functional deviation (f) is deened as the discrepancy in the percentage of FSM transitions traversed between the faulty and fault-free designs. Timing deviation (t) is the discrepancy in the number of simulated cycles between the faulty and fault-free designs. Simulation results show that our validation sequences are able to detect all the design faults considered, based on the two detection met-rics used.
منابع مشابه
Buffer Management in Distributed Database Systems: A Data Mining Based Approach
In this paper, we propose a data mining-based approach to public bu er management in distributed database systems where database bu ers are organized into two areas: public and private. While the private bu er areas contain pages to be updated by particular users, the public bu er area contains pages shared among users from di erent sites. Di erent from traditional bu er management strategies w...
متن کاملBu ered Steiner Tree Construction with Wire Sizing for Interconnect Layout Optimization
This paper presents an e cient algorithm for bu ered Steiner tree construction with wire sizing. Given a source and n sinks of a signal net, with given positions and a required arrival time associated with each sink, the algorithm nds a Steiner tree with bu er insertion and wire sizing so that the required arrival time (or timing slack) at the source is maximized. The unique contribution of our...
متن کاملFetch Size Adaptation vs. Stream Buuer for Media Benchmarks 1 Contents 1 Introduction 1 2 Related Work 1 3 Impacts of Variable Fetch Sizes and Stream Buuer 2 4 Fetch Size Adaptation 6
In current cache designs cache size and line size are often xed and determined by the spatial and temporal locality of benchmarks used to evaluate the targeted processors Stream bu er and large fetch size are two techniques that exploit spatial locality to hide memory latency In this paper we compare the e ectiveness of stream bu er and fetch size on media benchmarks We have presented a dynamic...
متن کاملContributions to Specification, Implementation, and Execution of Secure Software
This thesis contributes to three research areas in software security, namely security requirements and intrusion prevention via static analysis and runtime detection. We have investigated current practice in security requirements by doing a field study of eleven requirement specifications on IT systems. The conclusion is that security requirements are poorly specified due to three things: incon...
متن کاملTechniques for Adaptive Estimation of E ective Bandwidth in ATM Networks
This paper examines the e ectiveness of adaptive algorithms for estimation of e ective bandwidth in ATM networks. Large deviations results for constant capacity single server queues are used to derive a basic e ective bandwidth result which is applied to a linear representation of the input process giving the e ective bandwidth as a function of the cumulant generating function of the innovation...
متن کامل