Browse Prior Art Database

Hardware Change Verification

IP.com Disclosure Number: IPCOM000034436D
Original Publication Date: 1989-Feb-01
Included in the Prior Art Database: 2005-Jan-27
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Roth, JP: AUTHOR

Abstract

A method for determining whether or not a change in hardware design modifies the function of the original design. The method treats the change as if it were a failure and the D-algorithm, widely used for test generation, is used to determine whether or not the change induces a functional change in the hardware; it is vastly more efficient than the previously used method of VERIFY, which treated the original and the changed design as independent designs, as used, for example, on the IBM 3081 processor complex. Background In the development of a large hardware design, such as the IBM 3081 processor complex, many thousands of changes are made. For each such change, the question must be answered: was the overall function of the design changed? This invention describes an effective method for answering this question.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 89% of the total text.

Page 1 of 1

Hardware Change Verification

A method for determining whether or not a change in hardware design modifies the function of the original design. The method treats the change as if it were a failure and the D-algorithm, widely used for test generation, is used to determine whether or not the change induces a functional change in the hardware; it is vastly more efficient than the previously used method of VERIFY, which treated the original and the changed design as independent designs, as used, for example, on the IBM 3081 processor complex. Background In the development of a large hardware design, such as the IBM 3081 processor complex, many thousands of changes are made. For each such change, the question must be answered: was the overall function of the design changed? This invention describes an effective method for answering this question. The method is such that it is advantageous computationally to arrange the changes for verification so that they are as small as possible. The method combines VERIFY with the D- algorithm. Novel Features The method is to use VERIFY to determine the "local" test patterns, and then to use these in the D-algorithm, somewhat augmented, to compute "counter examples" to the equivalence of the "original" design and the design with the given change. It is orders of magnitude more efficient than the exclusive use of VERIFY, the method currently used. References J. Paul Roth, Computer Logic, Testing and Verification, Computer Science Pre...