首页> 外文学位 >Constraint manipulation techniques for synthesis and verification of embedded systems.
【24h】

Constraint manipulation techniques for synthesis and verification of embedded systems.

机译:用于嵌入式系统综合和验证的约束操作技术。

获取原文
获取原文并翻译 | 示例

摘要

Recently, the industry has adopted the programmable system-on-chip platform as architecture of choice that meets the performance and feature demands posed by many multi-application usercustomizable embedded systems. Due to increased design complexities, shortened time-to-market, and high sensitivity of product's economic success to R&D costs, system designers have adopted design reuse as a standard hardware and software design paradigm. In this work, we present several design methodologies that use constraint manipulation as means of (i) enabling effective debugging of core-based systems-on-chip as well as (ii) enforcing protection of intellectual property (IP) from fraud and misappropriation.; To facilitate system debugging, we introduce a cut-based functional debugging paradigm that leverages on the advantages of both emulation and simulation. The approach enables the user to run test sequences in emulation for fast execution and upon error detection, roll-back to an arbitrary instance in execution time, and transparently switch to simulation-based debugging for full design visibility and controllability.; We have developed a symbolic debugger, a tool that enables designers to interact with the executing code at the source level. When a behavioral specification is optimized using transformations, values of source code variables may be either inaccessible at run-time or inconsistent with what the designer expects. In response to a query, the symbolic debugger retrieves and displays values of source variables in a manner consistent with respect to the source statement where execution has halted. To facilitate error correction, we have developed a set of engineering change tools; i.e. constraint manipulation algorithms which perform functional or timing modifications on the design, while minimally altering its original optimized specification.; Since business models based on intellectual property are vulnerable to a number of potentially devastating obstructions such as misappropriation and IP fraud, we have developed two techniques for protecting copyright. The first technique, design watermarking, uses constraint manipulation to embed a secret message in the optimized design solution. The second technique, forensic analysis, analyzes whether a solution to an optimization problem could have been created using a particular optimization algorithm.
机译:最近,业界已采用可编程片上系统平台作为满足许多多应用用户可定制嵌入式系统提出的性能和功能要求的首选架构。由于增加的设计复杂性,缩短的上市时间以及产品的经济成功对研发成本高度敏感,系统设计人员已将设计重用作为标准的硬件和软件设计范例。在这项工作中,我们提出几种使用约束操作的设计方法,以(i)启用基于内核的片上系统的有效调试以及(ii)加强知识产权保护( IP)欺诈和挪用。为了促进系统调试,我们引入了基于剪切的功能调试范例,该范例利用了仿真和仿真的优势。该方法使用户能够在仿真中运行测试序列以快速执行并在检测到错误时在执行时回滚到任意实例,并透明地切换到基于仿真的调试以获得完整的设计可见性和可控性。我们已经开发了符号调试器,该工具使设计人员能够在源代码级别与正在执行的代码进行交互。当使用转换对行为规范进行优化时,源代码变量的值可能在运行时不可访问,或者与设计人员的期望不一致。响应查询,符号调试器以与执行已停止的源语句一致的方式检索和显示源变量的值。为了便于纠错,我们开发了一套工程变更工具;即约束操纵算法,可以对设计执行功能或时序修改,同时最小化其原始优化规格。由于基于知识产权的商业模式容易受到多种潜在破坏性障碍的侵害,例如盗用和IP欺诈,因此我们开发了两种保护版权的技术。第一项技术是设计水印,它使用约束操作将秘密消息嵌入优化的设计解决方案中。第二种技术,取证分析,分析是否可以使用特定的优化算法来创建优化问题的解决方案。

著录项

  • 作者

    Kirovski, Darko.;

  • 作者单位

    University of California, Los Angeles.;

  • 授予单位 University of California, Los Angeles.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2001
  • 页码 256 p.
  • 总页数 256
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号