Beyond feasibility: CP usage in constrained-random functional hardware verification

Reuven Naveh, Amit Metodi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Constraint programming (CP) figures prominently in the process of functional hardware verification. The verification process is based on generating random tests according to given set of constraints. In this paper. we introduce IntelliGen, a propagation based solver, and the random generator of Cadence's Specman verification tool. IntelliGen is designed to handle several problems beyond the mere need to find a feasible solution, including: generating random tests with a 'good' distribution over the solution space; maintaining test reproducibility through different run modes and minor code changes; and debug of the solving process by verification engineers. We discuss the advantages of CP solvers over other solving technologies (such as BDD, SAT or SMT), and how IntelliGen overcomes the disadvantages of CP.

Original languageEnglish
Title of host publicationPrinciples and Practice of Constraint Programming - 19th International Conference, CP 2013, Proceedings
Pages823-831
Number of pages9
DOIs
StatePublished - 22 Oct 2013
Externally publishedYes
Event19th International Conference on Principles and Practice of Constraint Programming, CP 2013 - Uppsala, Sweden
Duration: 16 Sep 201320 Sep 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8124 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Conference on Principles and Practice of Constraint Programming, CP 2013
Country/TerritorySweden
CityUppsala
Period16/09/1320/09/13

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Beyond feasibility: CP usage in constrained-random functional hardware verification'. Together they form a unique fingerprint.

Cite this