E ectiveness Evaluation of the Bu er - Oriented MicroarchitectureValidation

نویسندگان

  • N. Utamaphethai
  • R. D. Blanton
  • J. P. Shen
  • Pradip Bose
چکیده

In this paper, we evaluate the eeectiveness of the buuer-oriented microarchitecture validation methodology 1, 4, 5]. A list of design faults suggested by our industrial collaborator 2, 3] is used and investigated to determine if they can be detected by our generated validation sequences. Two metrics are used to determine the detection of the design faults: Functional deviation (f) is deened as the discrepancy in the percentage of FSM transitions traversed between the faulty and fault-free designs. Timing deviation (t) is the discrepancy in the number of simulated cycles between the faulty and fault-free designs. Simulation results show that our validation sequences are able to detect all the design faults considered, based on the two detection met-rics used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Buffer Management in Distributed Database Systems: A Data Mining Based Approach

In this paper, we propose a data mining-based approach to public bu er management in distributed database systems where database bu ers are organized into two areas: public and private. While the private bu er areas contain pages to be updated by particular users, the public bu er area contains pages shared among users from di erent sites. Di erent from traditional bu er management strategies w...

متن کامل

Bu ered Steiner Tree Construction with Wire Sizing for Interconnect Layout Optimization

This paper presents an e cient algorithm for bu ered Steiner tree construction with wire sizing. Given a source and n sinks of a signal net, with given positions and a required arrival time associated with each sink, the algorithm nds a Steiner tree with bu er insertion and wire sizing so that the required arrival time (or timing slack) at the source is maximized. The unique contribution of our...

متن کامل

Fetch Size Adaptation vs. Stream Buuer for Media Benchmarks 1 Contents 1 Introduction 1 2 Related Work 1 3 Impacts of Variable Fetch Sizes and Stream Buuer 2 4 Fetch Size Adaptation 6

In current cache designs cache size and line size are often xed and determined by the spatial and temporal locality of benchmarks used to evaluate the targeted processors Stream bu er and large fetch size are two techniques that exploit spatial locality to hide memory latency In this paper we compare the e ectiveness of stream bu er and fetch size on media benchmarks We have presented a dynamic...

متن کامل

Contributions to Specification, Implementation, and Execution of Secure Software

This thesis contributes to three research areas in software security, namely security requirements and intrusion prevention via static analysis and runtime detection. We have investigated current practice in security requirements by doing a field study of eleven requirement specifications on IT systems. The conclusion is that security requirements are poorly specified due to three things: incon...

متن کامل

Techniques for Adaptive Estimation of E ective Bandwidth in ATM Networks

This paper examines the e ectiveness of adaptive algorithms for estimation of e ective bandwidth in ATM networks. Large deviations results for constant capacity single server queues are used to derive a basic e ective bandwidth result which is applied to a linear representation of the input process giving the e ective bandwidth as a function of the cumulant generating function of the innovation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007