{"title":"Concurrent hardware/software coverification with Java threads","authors":"M. Azizi","doi":"10.1109/PCEE.2002.1115211","DOIUrl":null,"url":null,"abstract":"We present how Java threads are used to do concurrent coverification. The threads are scheduled with respect to the order of their priorities in the case of different priorities and by using the Round-Robin technique in the case of equal priorities. The system under coverification we are interested in consists eventually of a number of hardware and software modules described by threads at the behavioral level. The coverification process follows the execution path of the global modeled system and it verifies some specification properties during the simulation. We also discuss the case of untimed and timed coverification. An illustrative application on the broadcasting protocol of cache coherence reveals promising results.","PeriodicalId":444003,"journal":{"name":"Proceedings. International Conference on Parallel Computing in Electrical Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Conference on Parallel Computing in Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCEE.2002.1115211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We present how Java threads are used to do concurrent coverification. The threads are scheduled with respect to the order of their priorities in the case of different priorities and by using the Round-Robin technique in the case of equal priorities. The system under coverification we are interested in consists eventually of a number of hardware and software modules described by threads at the behavioral level. The coverification process follows the execution path of the global modeled system and it verifies some specification properties during the simulation. We also discuss the case of untimed and timed coverification. An illustrative application on the broadcasting protocol of cache coherence reveals promising results.