Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter

    Post-Silicon Fault Localization with Satisfiability Solvers

    This chapter covers techniques to localize faults in integrated circuits by means of automated satisfiability solvers. These techniques aim at identifying fault candidates for an erroneous execution trace by s...

    Georg Weissenbacher, Sharad Malik in Post-Silicon Validation and Debug (2019)

  2. No Access

    Chapter

    Verifying Security Properties in Modern SoCs Using Instruction-Level Abstractions

    This chapter describes a methodology for system-level security verification of modern Systems-on-Chip (SoC) designs. These designs comprise interacting intellectual property (IP) blocks which are often sourced...

    Pramod Subramanyan, Sharad Malik in Hardware IP Security and Trust (2017)

  3. No Access

    Article

    Specification and encoding of transaction interaction properties

    Transaction-level modeling is used in hardware design for describing designs at a higher level compared to the register-transfer level (RTL) (e.g. Cai and Gajski in CODES+ISSS ’03: proceedings of the 1st IEEE/...

    Divjyot Sethi, Yogesh Mahajan, Sharad Malik in Formal Methods in System Design (2011)

  4. Article

    Preface

    Aarti Gupta, Sharad Malik in Formal Methods in System Design (2009)

  5. No Access

    Chapter

    Modeling and Integration of Peripheral Devices in Embedded Systems

    This paper describes automation methods for device driver development in IP-based embedded systems in order to achieve high reliability, productivity, reusability and fast time to market. We formally specify d...

    Shaojie Wang, Sharad Malik, Reinaldo A. Bergamaschi in Embedded Software for SoC (2003)

  6. No Access

    Chapter

    Power Analysis of Embedded Software: First Step Towards Software Power Minimization

    Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical component of the design specifica...

    Vivek Tiwari, Sharad Malik, Andrew Wolfe in The Best of ICCAD (2003)

  7. No Access

    Article

    Limits of Using Signatures for Permutation Independent Boolean Comparison

    This paper addresses problems that arise while checking the equivalence of two Boolean functions under arbitrary input permutations. The permutation problem has several applications in the synthesis and verifi...

    Janett Mohnke, Paul Molitor, Sharad Malik in Formal Methods in System Design (2002)

  8. No Access

    Chapter

    Sat and ATPG: Algorithms for Boolean Decision Problems

    The problems of Boolean satisfiability (SAT) and automatic test pattern generation (ATPG) are strongly related — both in terms of application areas (pre-manufacturing design validation and post-manufacturing test...

    Wolfgang Kunz, João Marques-Silva, Sharad Malik in Logic Synthesis and Verification (2002)

  9. No Access

    Chapter

    Challenges in Code Generation for Embedded Processors

    The emergence of integrated circuits in which both the program-ROM and the processor are integrated on a single die initiates a new era of problems for programming language compilers. In such a micro-architect...

    Guido Araujo, Srinivas Devadas, Kurt Keutzer in Code Generation for Embedded Processors (2002)

  10. No Access

    Article

    A Retargetable Compilation Methodology for Embedded Digital Signal Processors Using a Machine-Dependent Code Optimization Library

    We address the problem of code generation for embedded DSP systems. Such systems devote a limited quantity of silicon to program memory, so the embedded software must be sufficiently dense. Additionally, this ...

    Ashok Sudarsanam, Sharad Malik, Masahiro Fujita in Design Automation for Embedded Systems (1999)

  11. No Access

    Book

  12. No Access

    Chapter

    Related Work in Timing Analysis for Embedded Software

    The importance and the challenges in extreme case timing analysis of embedded software have been recognized by many researchers. Numerous analysis techniques have been proposed to solve the issues in program p...

    Yau-Tsun Steven Li, Sharad Malik in Performance Analysis of Real-Time Embedded Software (1999)

  13. No Access

    Chapter

    Conclusions

    The growth in software and hardware complexity demands more sophisticated system verification tools. For real-time systems, the critical property to be verified is that the system response time is within the s...

    Yau-Tsun Steven Li, Sharad Malik in Performance Analysis of Real-Time Embedded Software (1999)

  14. No Access

    Chapter

    Introduction

    Embedded systems are characterized by the presence of processors running application specific programs. They differ from traditional digital systems, in which most of the system functionality is implemented in...

    Yau-Tsun Steven Li, Sharad Malik in Performance Analysis of Real-Time Embedded Software (1999)

  15. No Access

    Chapter

    Microarchitecture Modeling

    The tightness of a program’s estimated bound depends on the accuracy in both path modeling and instruction timing modeling. In Chapter 3, we have shown that program path analysis models the set of feasible exe...

    Yau-Tsun Steven Li, Sharad Malik in Performance Analysis of Real-Time Embedded Software (1999)

  16. No Access

    Article

    Paged Absolute Addressing Mode Optimizations for Embedded Digital Signal Processors Using Post-pass Data-flow Analysis

    We address the problem of code generation for embedded DSP systems. In such systems, it is typical for one or more digital signal processors (DSPs), program memory, and custom circuitry to be integrated onto a...

    Ashok Sudarsanam, Sharad Malik, Steve Tjiang in Design Automation for Embedded Systems (1999)

  17. No Access

    Chapter

    Program Path Analysis

    In Chapter 1, we described how the execution time of a program depends on the flow of the program and also the timing properties of the hardware. In this chapter, we will focus on analyzing the flow of the pro...

    Yau-Tsun Steven Li, Sharad Malik in Performance Analysis of Real-Time Embedded Software (1999)

  18. No Access

    Chapter

    A Retargetable Timing Analysis Tool — Cinderella

    We have implemented the timing analysis technique described in the previous two chapters in a tool called Cinderella. Cinderella automatically formulates the ILP problem and passes it to the ILP solver. With C...

    Yau-Tsun Steven Li, Sharad Malik in Performance Analysis of Real-Time Embedded Software (1999)

  19. No Access

    Article

    Instruction level power analysis and optimization of software

    The increasing popularity of power constrained mobile computers and embedded computing applications drives the need for analyzing and optimizing power in all the components of a system. Software constitutes a ...

    Vivek Tiwari, Sharad Malik, Andrew Wolfe in Journal of VLSI signal processing systems … (1996)

  20. No Access

    Chapter

    Instruction Level Power Analysis and Optimization of Software

    The increasing popularity of power constrained mobile computers and embedded computing applications drives the need for analyzing and optimizing power in all the components of a system. Software constitutes a ...

    Vivek Tiwari, Sharad Malik, Andrew Wolfe in Technologies for Wireless Computing (1996)

previous disabled Page of 2