FM8501: A Verified Microprocessor

FM8501: A Verified Microprocessor

Author: Warren A. Hunt

Publisher: Springer Science & Business Media

Published: 1994-05-20

Total Pages: 356

ISBN-13: 9783540579601

DOWNLOAD EBOOK

This book, written for a wide readership with some background in the natural sciences, addresses the very old problem of the mind-brain-relationship. The authors, all well-known scientists, approach the subject in different stages. The first part addresses some general principles based on physics, computer science, and theoretical biology. The two following parts deal with the problem at different organizational levels, from the microscopic to the macroscopic. The fourth part addresses the subjective level founded on the findings of psychologists and neurophysiologists.


Correct Hardware Design and Verification Methods

Correct Hardware Design and Verification Methods

Author: George J. Milne

Publisher: Springer Science & Business Media

Published: 1993-05-12

Total Pages: 284

ISBN-13: 9783540567783

DOWNLOAD EBOOK

These proceedings contain the papers presented at the Advanced Research Working Conference on Correct Hardware Design Methodologies, held in Arles, France, in May 1993, and organized by the ESPRIT Working Group 6018 CHARME-2and the Universit de Provence, Marseille, in cooperation with IFIP Working Group 10.2. Formal verification is emerging as a plausible alternative to exhaustive simulation for establishing correct digital hardware designs. The validation of functional and timing behavior is a major bottleneck in current VLSI design systems, slowing the arrival of products in the marketplace with its associated increase in cost. From being a predominantly academic area of study until a few years ago, formal design and verification techniques are now beginning to migrate into industrial use. As we are now witnessing an increase in activity in this area in both academia and industry, the aim of this working conference was to bring together researchers and users from both communities.


Piton

Piton

Author: J Strother Moore

Publisher: Springer

Published: 2007-08-28

Total Pages: 322

ISBN-13: 0585336547

DOWNLOAD EBOOK

Mountaineers use pitons to protect themselves from falls. The lead climber wears a harness to which a rope is tied. As the climber ascends, the rope is paid out by a partner on the ground. As described thus far, the climber receives no protection from the rope or the partner. However, the climber generally carries several spike-like pitons and stops when possible to drive one into a small crack or crevice in the rock face. After climbing just above the piton, the climber clips the rope to the piton, using slings and carabiners. A subsequent fall would result in the climber hanging from the piton—if the piton stays in the rock, the slings and carabiners do not fail, the rope does not break, the partner is holding the rope taut and secure, and the climber had not climbed too high above the piton before falling. The climber's safety clearly depends on all of the components of the system. But the piton is distinguished because it connects the natural to the artificial. In 1987 I designed an assembly-level language for Warren Hunt's FM8501 verified microprocessor. I wanted the language to be conveniently used as the object code produced by verified compilers. Thus, I envisioned the language as the first software link in a trusted chain from verified hardware to verified applications programs. Thinking of the hardware as the "rock" I named the language "Piton.


A Computational Logic Handbook

A Computational Logic Handbook

Author: Robert S. Boyer

Publisher: Elsevier

Published: 2014-05-10

Total Pages: 427

ISBN-13: 148327778X

DOWNLOAD EBOOK

Perspectives in Computing: A Computational Logic Handbook contains a precise description of the logic and a detailed reference guide to the associated mechanical theorem proving system, including a primer for the logic as a functional programming language, an introduction to proofs in the logic, and a primer for the mechanical theorem. The publication first offers information on a primer for the logic, formalization within the logic, and a precise description of the logic. Discussions focus on induction and recursion, quantification, explicit value terms, dealing with features and omissions, elementary mathematical relationships, Boolean operators, and conventional data structures. The text then takes a look at proving theorems in the logic, mechanized proofs in the logic, and an introduction to the system. The text examines the processes involved in using the theorem prover, four classes of rules generated from lemmas, and aborting or interrupting commands. Topics include executable counterparts, toggle, elimination of irrelevancy, heuristic use of equalities, representation of formulas, type sets, and the crucial check points in a proof attempt. The publication is a vital reference for researchers interested in computational logic.


Applied Formal Methods - FM-Trends 98

Applied Formal Methods - FM-Trends 98

Author: Dieter Hutter

Publisher: Springer

Published: 2007-07-21

Total Pages: 391

ISBN-13: 3540482571

DOWNLOAD EBOOK

This volume contains the contributions presented at the International Workshop on Current Trends in Applied Formal Methods organized October 7-9, 1998, in Boppard, Germany. The main objective of the workshop was to draw a map of the key issues facing the practical application of formal methods in industry. This appears to be particularly timely with safety and security issues becoming a real obstacle to industrial software and hardware development. As a consequence, almost all major companies have now set up departments or groups to work with formal methods and many European countries face a severe labour shortage in this new field. Tony Hoare's prediction of the art of software (and hardware) development becoming a proper engineering science with its own body of tools and techniques is now becoming a reality. So the focus of this application oriented workshop was not so much on spe cial academic topics but rather on the many practical aspects of this emerging new technology: verification and validation, and tool support and integration into the software life-cycle. By evaluating the state of the art with respect to industrial applications a discussion emerged among scientists, practising engi neers, and members of regulatory and funding agencies about future needs and developments. This discussion lead to roadmaps with respect to the future of this field, to tool support, and potential application areas and promising market segments. The contributions of the participants from industry as well as from the respective national security bureaus were particularly valuable and highly appreciated.