Protocol Verification as a Hardware Design Aid (1992)

Cached

Download Links

by David L. Dill , Andreas J. Drexler , Alan J. Hu , C. Han Yang
Venue:IN IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS AND PROCESSORS
Citations:234 - 27 self

Documents Related by Co-Citation

1297 Symbolic Model Checking – K L McMillan - 1993
1254 The model checker SPIN – Gerard J. Holzmann - 1997
762 Design and Validation of Computer Protocols – G Holzmann - 1991
1173 Automatic verification of finite-state concurrent systems using temporal logic specifications – E. M. Clarke, E. A. Emerson, A. P. Sistla - 1986
2927 Graph-based algorithms for Boolean function manipulation – Randal E. Bryant - 1986
623 Model checking and abstraction – Peter J. Clarke, Djuradj Babich, Tariq M. King, B. M. Golam Kibria - 1994
319 The Stanford FLASH multiprocessor – Jeffrey Kuskin, David Ofelt, Mark Heinrich, John Heinlein, Richard Simoni, Kourosh Gharachorloo, John Chapin, David Nakahira, Joel Baxter, Mark Horowitz, Anoop Gupta, Mendel Rosenblum, John Hennessy - 1994
21 A New Scheme for Memory-Efficient Probabilistic Verification – Ulrich Stern, David L. Dill - 1996
42 Automatic Verification of the SCI Cache Coherence Protocol – Ulrich Stern, David L. Dill - 1995
295 Tempest and Typhoon: User-level Shared Memory – Steven K. Reinhardt, James R. Larus, David A. Wood - 1994
879 Symbolic Boolean manipulation with ordered binary-decision diagrams – Randal E Bryant - 1992
21 Efficient Verification of Symmetric Concurrent Systems – C. Norris Ip , David L. Dill - 1993
184 Chandy and Jayadev Misra. Parallel Program Design: A Foundation – K Mani - 1988
12 State Reduction Using Reversible Rules – C. Norris Ip, C. Norris, Ip David, David L. Dill - 1996
42 Verifying Systems with Replicated Components in Murφ – C. Norris Ip, David L. Dill - 1997
185 Better Verification Through Symmetry – C. Norris Ip , David L. Dill - 1996
61 Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches – Catherine A. Meadows - 1996
95 Modelling and verifying key-exchange protocols using CSP and FDR – A. W. Roscoe - 1995
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978