Search Results - "Kroening, D."

Refine Results
  1. 1

    A Survey of Automated Techniques for Formal Software Verification by D'Silva, V., Kroening, D., Weissenbacher, G.

    “…The quality and the correctness of software are often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a…”
    Get full text
    Journal Article
  2. 2

    Reinforcement Learning for Temporal Logic Control Synthesis with Probabilistic Satisfaction Guarantees by Hasanbeig, M., Kantaros, Y., Abate, A., Kroening, D., Pappas, G. J., Lee, I.

    “…We present a model-free reinforcement learning algorithm to synthesize control policies that maximize the probability of satisfying high-level control…”
    Get full text
    Conference Proceeding
  3. 3

    Periodic Orbits and Equilibria in Glass Models for Gene Regulatory Networks by Zinovik, I., Chebiryak, Y., Kroening, D.

    Published in IEEE transactions on information theory (01-02-2010)
    “…Glass models are frequently used to model gene regulatory networks. A distinct feature of the Glass model is that its dynamics can be formalized as paths…”
    Get full text
    Journal Article
  4. 4

    Computing Binary Combinatorial Gray Codes Via Exhaustive Search With SAT Solvers by Zinovik, I., Kroening, D., Chebiryak, Y.

    Published in IEEE transactions on information theory (01-04-2008)
    “…The term binary combinatorial Gray code refers to a list of binary words such that the Hamming distance between two neighboring words is one and the list…”
    Get full text
    Journal Article
  5. 5

    Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog by Jain, H., Kroening, D., Sharygina, N., Clarke, E.M.

    “…As a first step, most model checkers used in the hardware industry convert a high-level register-transfer-level (RTL) design into a netlist. However,…”
    Get full text
    Journal Article
  6. 6

    Word level predicate abstraction and refinement for verifying RTL Verilog by Himanshu Jain, Kroening, D., Sharygina, N., Clarke, E.

    “…Model checking techniques applied to large industrial circuits suffer from the state space explosion problem. A major technique to address this problem is…”
    Get full text
    Conference Proceeding
  7. 7

    Automated pipeline design by Kroening, Daniel, Paul, Wolfgang J.

    “…The interlock and forwarding logic is considered the tricky part of fully-featured piplined microprocessor and especially debugging these parts delays the…”
    Get full text
    Conference Proceeding
  8. 8

    Formal verification of SystemC by automatic hardware/software partitioning by Kroening, D., Sharygina, N.

    “…Variants of general-purpose programming languages, like SystemC, are increasingly used to specify system designs that have both hardware and software parts…”
    Get full text
    Conference Proceeding
  9. 9

    A SAT-based algorithm for reparameterization in symbolic simulation by Chauhan, Pankaj, Clarke, Edmund M., Kroening, Daniel

    “…Parametric representations used for symbolic simulation of circuits usually use BDDs. After a few steps of symbolic simulation, state set representation is…”
    Get full text
    Conference Proceeding
  10. 10

    Specifying and verifying systems with multiple clocks by Clarke, E.M., Kroening, D., Yorav, K.

    “…Multiple clock domains are a challenge for hardware specification and verification. We present a method for specifying the relations between multiple clocks,…”
    Get full text
    Conference Proceeding
  11. 11

    Computing Mutation Coverage in Interpolation-Based Model Checking by Chockler, H., Kroening, D., Purandare, M.

    “…Coverage is a means to quantify the quality of a system specification, and is frequently applied to assess progress in system validation. Coverage is a…”
    Get full text
    Journal Article
  12. 12

    Test-case generation for embedded simulink via formal concept analysis by He, Nannan, Rümmer, Philipp, Kroening, Daniel

    “…Mutation testing suffers from the high computational cost of automated test-vector generation, due to the large number of mutants that can be derived from…”
    Get full text
    Conference Proceeding
  13. 13

    Computing Binary Combinatorial Gray Codes Via Exhaustive Search With SAT Solvers I It -I I I by Zinovik, I, Kroening, D, Chebiryak, Y

    Published in IEEE transactions on information theory (01-04-2008)
    “…The term binary combinatorial Gray code refers to a list of binary words such that the Hamming distance between two neighboring words is one and the list…”
    Get full text
    Journal Article
  14. 14

    Predicate Abstraction of ANSI-C Programs Using SAT by Clarke, Edmund, Kroening, Daniel, Sharygina, Natasha, Yorav, Karen

    Published in Formal methods in system design (01-09-2004)
    “…Predicate abstraction is a major method for verification of software. However, the generation of the abstract Boolean program from the set of predicates and…”
    Get full text
    Journal Article
  15. 15

    Ligation-mediated PCR amplification of specific fragments from a Class-II restriction endonuclease total digest by Guilfoyle, Richard A., Leeck, Charles L., Kroening, K. Dubear, Smith, Lloyd M., Guo, Zhen

    Published in Nucleic acids research (01-05-1997)
    “…A method is described which permits the ligationmediated PCR amplification of specific fragments from a Class-II restriction endonuclease total digest…”
    Get full text
    Journal Article
  16. 16

    Behavioral consistency of C and verilog programs using bounded model checking by Clarke, Edmund, Kroening, Daniel, Yorav, Karen

    “…We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the…”
    Get full text
    Conference Proceeding
  17. 17

    Checking consistency of C and Verilog using predicate abstraction and induction by Kroening, Daniel, Clarke, Edmund

    “…It is common practice to write C models of circuits due to the greater simulation efficiency. Once the C program satisfies the requirements, the circuit is…”
    Get full text
    Conference Proceeding
  18. 18

    Verification of SpecC using predicate abstraction by Jain, H., Kroening, D., Clarke, E.

    “…Languages such as SystemC or SpecC offer a new design paradigm that addresses the industry's need for a fast time-to-market. However, formal verification…”
    Get full text
    Conference Proceeding
  19. 19

    Fault tolerance tradeoffs in moving from decentralized to centralized embedded systems by Morris, J., Kroening, D., Koopman, P.

    “…Some safety-critical distributed embedded systems may need to use centralized components to achieve certain dependability properties. The difficulty in…”
    Get full text
    Conference Proceeding
  20. 20

    Fixed points for multi-cycle path detection by D'Silva, V., Kroening, D.

    “…Accurate timing analysis is crucial for obtaining the optimal clock frequency, and for other design stages such as power analysis. Most methods for estimating…”
    Get full text
    Conference Proceeding