In-system constrained-random stimuli generation for post-silicon validation
Citations
9 citations
8 citations
Cites background or methods from "In-system constrained-random stimul..."
...It is also worth noting that the existing reseeding-based methods [15], [18] for post-silicon validation do not provide any control for the stimuli distribution....
[...]
...It is important to note that a thorough comparisons of cube-masking methods against reseeding-basedmethods [15], [18] has been provided in [16], [19], [20]....
[...]
...The on-chip area for [16], [19] do not depend on the LFSR length (unlike [15], [18]),...
[...]
...The methods from [15], [18] proposed to represent the original constraints (written in pre-silicon verification environments) by an...
[...]
8 citations
Cites background or methods from "In-system constrained-random stimul..."
...It should be noted that in the same way as reported in [9], the goal of these experiments is to show how long runs of constrainedrandom stimuli can be generated on-chip efficiently in real-time....
[...]
...The same end is achieved by the architecture proposed in [9], however, that approach loads all the basis vectors into registers which are selectively masked before summation by the bits which have value 0 of their equivalent to our Basis counter....
[...]
...Thus, instead of requiring a large register array that scales quadratically with the LFSR size (as in [9]), only a few support registers are required, with the complexity being pushed into the addressing logic and the far greater number of accesses required to the memory....
[...]
...As mentioned above, a key insight for greater efficiency of the architecture for expansion is a Gray-code like traversal of the set of all combinations of the basis vectors as opposed to a simple linear one, where more than one basis vector must be added / removed to obtain an updated seed, as done by [9]....
[...]
...The basic idea from [9] is to map the functionally-compliant sequences onto linear-feedback shift registers (LFSRs)....
[...]
6 citations
6 citations
Cites background or methods from "In-system constrained-random stimul..."
...It should also be noted that in the flow from Fig....
[...]
...Consider the case of generating stimuli containing two 4-bit signals a and b with the constraint a ≥ b....
[...]
...The constraints on the operands can be updated during the verification process, so as to focus on the suspicious ranges where the division calculation might be incorrectly implemented....
[...]
...Both methods from [14] and [15] and the preliminary versions of our method [28], [29], translate the user-defined constraints into an equivalent set of cubes as shown in Fig....
[...]
References
9,021 citations
6,675 citations
"In-system constrained-random stimul..." refers background in this paper
...Solving a SAT problem is known to be NP-complete (Cook, 1971), nevertheless, many SAT algorithms have been developed that have been proven to be efficient in practical applications....
[...]
2,985 citations
"In-system constrained-random stimul..." refers methods in this paper
...An off-the-shelf solver [8] has been used for the SAT component, however it should be noted that scalability to the the larger SAT instances will require an integrated GF2/SAT hybrid solver when working with larger number of forced bits....
[...]
...In order to search this space more efficiently, we capture this space as a SAT instance, and leverage the power of modern SAT solvers which perform learning over the solution space through techniques such as generating conflict clauses [8]....
[...]
2,355 citations
"In-system constrained-random stimul..." refers background in this paper
...The design rules checking (DRC) and electrical rules checking (ERC) verify if geometrical distances needed for correct fabrication are respected (Weste and Harris, 2011)....
[...]
1,571 citations
"In-system constrained-random stimul..." refers methods in this paper
...Some methods based on word-level constraints solving for high-level modelling have been proposed (Jaffar and Maher, 1994), however bit-level manipulation is eventually required whenever logic conditions arise....
[...]