簡易檢索 / 詳目顯示

研究生: 張光榕
Kuang-Jung Chang
論文名稱: A Cube-based Approach to Reachability Analysis
一種多狀態為基礎的方法來進行可達性分析
指導教授: 王俊堯
Chun-Yao Wang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 28
中文關鍵詞: 可達性分析二元決策圖
外文關鍵詞: Reachablity Analysis, Binary Decision Diagram
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在電路的合成、正規驗證和測試上,可達性分析都扮演了相當重要的角色。象徵性演算法,也就是利用二元決策圖來表示狀態的集合以及執行映像計算已經發展了十幾年,這些象徵性演算法都是以時間框架為基礎的,也就是一次將整個時間框架的映象算出來,然而,由於二元決策圖的大小呈現爆炸性的擴張,使得映像計算在較大的循序電路上變得相當棘手,因此,在可達性分析的問題裡,對每個時間框架都去計算完整的映像變得不切實際。本篇論文提出了一種新的以多狀態
    為基礎的演算法來做可達性分析,此種演算法以類似分而治之的方式來進行可達性分析,盡量在有限的時間內到達最大的狀態,這種方法藉由反覆的執行部分的小的映像計算來取代龐大的映像計算,因此,每個映像計算的複雜度、CPU時間和內存的使用都比較小。如此,在計算映象的過程中就不會卡在某個相當複雜且龐大的時間框架中。將實驗結果與VIS作比較,此種做法可以達到更多的狀態在相同CPU時間並且使用較少的記憶體。


    Reachability analysis is an important step in formal verification, synthesis, and testing of sequential circuits. Symbolic algorithms that represent state sets and
    perform image computation by binary decision diagram (BDD) have been developed for more than one decade. Those symbolic methods are timeframe-based, i.e., performing image computation on the whole state set one timeframe after another timeframe. However, the image computation operation on large sequential circuits becomes more intractable due to explosive expansion of BDD size. Thus, computing the entire reachable state set in each timeframe becomes impractical in the reachability analysis. In this paper, we propose a novel cube-based algorithm that does not compute the complete reachable state set of each timeframe at a time. The cube-based algorithm traverses the state space in a divide-and-conquer manner to maximize the number of reached states with limited computation resources. This approach performs partial small image computations iteratively instead of one complete but huge image computation. As a result, the computation complexity of each iteration would be smaller, so does the CPU time and memory usage. Therefore, the reaching process would not get stuck in a certain timeframe in which image is too complex to be computed. As comparing the results with VIS, this approach could reach more states within the same CPU time and use less memory.

    摘要i Abstract ii Acknowledgements iii Contents iv List of Tables vi List of Figures vii 1 Introduction 1 1.1 Tranditional Reachability Analysis . . . . . . . . . . . . . . . . . . . 1 1.2 Previous Improvements . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Our Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Preliminaries 5 3 Image Computation with The Restrictive Representation 9 3.1 Representation of A State Set . . . . . . . . . . . . . . . . . . . . . . 9 3.2 The Transformation between Two Representations . . . . . . . . . . . 11 3.3 Symbolic Simulation and Transformations of Our Image Computation 13 3.4 The Efficient Image Computation . . . . . . . . . . . . . . . . . . . . 14 3.5 Redundant Computation Prevention on The Reached State Set . . . . 17 4 Cube-based Reachability Analysis 19 5 Experimental Results 22 6 Conclusions 25 References 25

    [1] A. Biere, A. Cimatti, E. M. Clarke, M. Fujita, and Y. Zhu, “Symbolic model
    checking using SAT procedures instead of BDDs,” in Proc. Design Automation
    Conf., pp. 317-320, 1999.
    [2] R. E. Bryant, “Graph-based algorithms for boolean function manipulation,” in
    IEEE Trans. Computer, vol. C-35, pp. 677-691, 1986.
    [3] R. K. Brayton et al, “VIS: A system for verification and synthesis,” in
    Proc. Int. Conf. Computer-Aided Verification, pp. 423-427, 1996.
    [4] H. Cho, G. D. Hatchel, E. Macii, B. Plessier, and F. Somenzi, “Algorithms
    for approximate FSM traversal based on state space decomposition,”
    in Proc. Int. Conf. on Design Automation, pp. 25-30, 1993.
    [5] P. Chauhan, E. M. Clarke, and D. Kroening, “Using SAT-based image computation
    for reachability analysis,” in Technical Report CMU-CS-03-151, Carnegie
    Mellon University, 2003.
    [6] O. Coudert, C. Berthet, and J. C. Madre, “Verification of synchronous sequential
    machines based on symbolic execution,” in Proc. Computer-Adied Verification,
    LNCS. 407, 1989.
    [7] A. Gupta, Z. Yang, P. Ashar, and A. Gupta, “SAT–based image computation
    with application in reachability analysis,” in Proc. Int. Conf. Formal Methods
    in Computer-Aided Design, pp. 354-372, 2000.
    [8] A. Gupta, Z. Yang, P. Ashar, L. Zhang, and S. Malik, “Partitionbased
    decision heuristics for image computation using SAT and BDDs,” in
    Proc. Int. Conf. Compute-Aided Design, pp. 286-292, 2001.
    [9] S. G. Govindaraju, D. L. Dill, A. Hu, and M. A. Horowitz, “Approximate
    reachability analysis with BDDs using overlapping projections,” in Proc. Design
    Automation Conference, pp. 451-456 , 1998.
    [10] R. Hojati, S. Krishnan, and R. K. Brayton. “Heuristic algorithms for early
    quantification and partial product minimization,” in Technical Report M94/11,
    UC Berkeley, 1994.
    [11] R. Hojati, S. C. Krishnan, and R. K. Brayton, “Early quantification and partitioned
    transition relations,” in Proc. Int. Conf. on Computer Design, pp. 12-19,
    1996.
    [12] N. Ishiura, H. Sawada, and S. Yajima, “Minimization of binary decision diagrams
    based on exchanges of variables,” in Proc. Int. Conf. on Computer-Aided
    Design, pp. 472-475, 1991.
    [13] J. H. R. Jiang and R. K. Brayton, “On the verification of sequential equivalence,”
    in IEEE Trans. Computer-Aided Design, pp. 686-697, 2003.
    [14] R. Rudell, “Dynamic variable ordering for binary decision diagrams,” in
    Proc. Int. Conf. on Computer-Aided Design, pp. 42-47, 1993.
    [15] R. K. Ranjan, A. Adnan, R. K. Brayton, B. Plessier, and C. Pixley, “Efficient
    BDD algorithms for FSM synthesis and verification,” Presented at IWLS’95:
    IEEE International Workshop on Logic Synthesis, 1995.
    [16] I. H. Moon, J. Y. Jang, G. D. Hacthtel, F. Somenzi, J. Yuan, and C. Pixley,
    “Approximate reachability don’t cares for CTL model checking,” in
    Proc. Int. Conf. on Computer-Aided Design, pp. 351-358, 1998.
    [17] D. Stoffel, M. Wedler, P. Warkentin and W. Kunz, “Structural FSM traversal,”
    in IEEE Trans. Computer-Aided Design, vol. 23, no. 5, pp. 598-619, 2004.
    [18] D. Stoffel and W. Kunz, “Record & play: A structural fixed point iteration
    for sequential circuit verification,” in Proc. Int. Conf. Computer-Aided Design,
    pp. 394-399, 1997.
    [19] E. M. Sentovich, K. J. Singh, L. Lavagno, C. Moon, R. Murgai, A. Saldanha,
    H. Savoj, P. R. Stephan, R. K. Brayton, and A. Sangiovanni-Vincentelli, “SIS: A
    System for sequential circuit synthesis,” Technical Report UCB/ERL M92/41,
    Electronics Research Lab, Univ. of California, Berkeley, CA 94720, 1992.
    [20] F. Somenzi et al, “CUDD: university of colorado decision diagram package.”
    http://vlsi.colorado.edu/˜fabio/CUDD

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE