-
1
-
-
84947431894
-
Rulebase: Model checking at IBM
-
I. Beer et al. Rulebase: Model Checking at IBM. In Computer Aided Verification, pages 480-483, 1997.
-
(1997)
Computer Aided Verification
, pp. 480-483
-
-
Beer, I.1
-
2
-
-
0142206120
-
Validating the Intel®Pentium®4 processor
-
February
-
B. Bentley and R. Gray. Validating the Intel®Pentium®4 Processor. Intel Technology Journal, 5(1), February 2001.
-
(2001)
Intel Technology Journal
, vol.5
, Issue.1
-
-
Bentley, B.1
Gray, R.2
-
3
-
-
0032630134
-
Symbolic model checking using SAT procedures instead of BDDs
-
A. Biere, A. Cimatti, E. M. Clarke, M. Fujita, and Y. Zhu. Symbolic Model Checking using SAT procedures instead of BDDs. In Proc. Design Automation Conf., 1999.
-
(1999)
Proc. Design Automation Conf.
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Fujita, M.4
Zhu, Y.5
-
4
-
-
84944319371
-
Symbolic model checking without BDDs
-
Proc. Tools and Algorithms for the Analysis and Construction of Systems (TACAS'99). Springer-Verlag
-
A. Biere, A. Cimatti, E. M. Clarke, and Y. Zhu. Symbolic Model Checking without BDDs. In Proc. Tools and Algorithms for the Analysis and Construction of Systems (TACAS'99), volume 1579 of LNCS. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1579
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Zhu, Y.4
-
5
-
-
84957366381
-
The NCSU concurrency work-bench
-
R. Alur and T. Henzinger, editors. Lecture Notes in Computer Science, Springer-Verlag
-
R. Cleaveland and S. Sim. The NCSU Concurrency Work-bench. In R. Alur and T. Henzinger, editors, Computer Aided Verification, volume 1102, pages 394-397. Lecture Notes in Computer Science, Springer-Verlag, 1996.
-
(1996)
Computer Aided Verification
, vol.1102
, pp. 394-397
-
-
Cleaveland, R.1
Sim, S.2
-
6
-
-
0005609318
-
Benefits of bounded model checking at an industrial setting
-
F. Copty et al. Benefits of Bounded Model Checking at an Industrial Setting. In Proc. Computer Aided Verification, 2001.
-
(2001)
Proc. Computer Aided Verification
-
-
Copty, F.1
-
7
-
-
84944414446
-
Prioritized traversal: Efficient reachability analysis for verification and falsification
-
R. Fraer et al. Prioritized Traversal: Efficient Reachability Analysis for Verification and Falsification. In Computer Aided Verification, pages 389-402, 2000.
-
(2000)
Computer Aided Verification
, pp. 389-402
-
-
Fraer, R.1
-
8
-
-
0005599065
-
Symbolic trajectory evaluation
-
T. Kropf, editor, Formal Hardware Verification: Methods and Systems in Comparison. Springer-Verlag
-
S. Hazelhurst and C.-J. H. Seger. Symbolic trajectory evaluation. In T. Kropf, editor, Formal Hardware Verification: Methods and Systems in Comparison, volume 1287 of LNCS. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1287
-
-
Hazelhurst, S.1
Seger, C.-J.H.2
-
11
-
-
0001087280
-
Hyper-threading technology architecture and microarchitecture
-
February
-
D. T. Marr et al. Hyper-Threading Technology Architecture and Microarchitecture. Intel Technology Journal, 6(1), February 2002.
-
(2002)
Intel Technology Journal
, vol.6
, Issue.1
-
-
Marr, D.T.1
-
14
-
-
0034224829
-
Sequential equivalence checking based on structural similarities
-
July
-
C. A. J. van Eijk. Sequential equivalence checking based on structural similarities. IEEE Trans. CAD, 19(7):814-819, July 2000.
-
(2000)
IEEE Trans. CAD
, vol.19
, Issue.7
, pp. 814-819
-
-
Van Eijk, C.A.J.1
|