Explore chapters and articles related to this topic
Formal Property Verification
Published in Louis Scheffer, Luciano Lavagno, Grant Martin, EDA for IC System Design, Verification, and Testing, 2018
To use this idea effectively, we need a compact representation for Boolean formulas, on which Boolean operations and existential quantification can be efficiently applied. For this purpose, binary decision diagrams (BDDs) are commonly used. A BDD is a decision graph in which variables occur in the same order along all paths, and common subgraphs are combined. In 1986, Bryant gave an efficient algorithm for Boolean operations on this structure [37]. Symbolic model checking using BDDs provides a means of property checking for circuits of modest size (typically up to a few hundred registers) in cases where the state graph is far too large to be constructed explicitly. This method was used successfully to find errors in the cache coherence protocols of a commercial multiprocessor [38], and has since been used in a number of commercial EDA tools, with many improvements introduced in the 1990s.
Formal Property Verification
Published in Luciano Lavagno, Igor L. Markov, Grant Martin, Louis K. Scheffer, Electronic Design Automation for IC System Design, Verification, and Testing, 2017
Limor Fix, Ken McMillan, Norris Ip, Leopold Haller
To use this idea effectively, we need a compact representation for Boolean formulas, on which Boolean operations and existential quantification can be efficiently applied. For this purpose, binary decision diagrams (BDDs) are commonly used. A BDD is a decision graph in which variables occur in the same order along all paths and common subgraphs are combined. In 1986, Bryant gave an efficient algorithm for Boolean operations on this structure [37]. SMC using BDDs provides a means of property checking for circuits of modest size (typically up to a few hundred registers) in cases where the state graph is far too large to be constructed explicitly. This method was used successfully to find errors in the cache coherence protocols of a commercial multiprocessor [38] and has since been used in a number of commercial EDA tools, with many improvements introduced in the 1990s.
Why Do We Fail to Find the Needle?
Published in Yair Neuman, How to Find a Needle in a Haystack, 2023
In the real world, it is not so easy to reach a clear-cut binary decision. Think about Snowden, for example. He is a tech nerd with clear signs of mental rigidity. However, if you recruit people to work as technologists, then you may want them to be well-organized individuals rather than sloppy workers. As a kind of a package deal, this requirement may be hypothetically accompanied by a relatively high incidence of obsessive–compulsive individuals and computer geeks with an Asperger's-type signature. Thus, you may get individuals who are not only talented but also mentally and morally rigid, like Snowden seems to be. Using “Snowden's signature” for a machine learning (ML) classification algorithm to select employees may therefore backfire.
A budget optimisation model for road safety infrastructure countermeasures
Published in Cogent Engineering, 2022
Chris Bic Byaruhanga, Harry Evdorides
The second constraint (Equation 3) ensures a mix between measures from the two categories. are the number of selections made for capital and maintenance work measures, respectively, within the available budget (B). are the discounted costs for capital work measure and maintenance work measure , respectively. represent the total number of capital and maintenance work measures, respectively. are binary decision variables (1 if selected, otherwise 0).