12.07.2015 Views

ACL2-Based Verification of NoC Communication Infrastructures

ACL2-Based Verification of NoC Communication Infrastructures

ACL2-Based Verification of NoC Communication Infrastructures

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Pro<strong>of</strong> <strong>of</strong> HERMES• Scheduling function:WormHSched(L,TM,A,S) ≡if empty(L)then list(TM,A,S)elseList <strong>of</strong> messagesState <strong>of</strong> the networkArrived messagesEn route messageslet tr=first(L) /* first message */and r=routesOf(tr) /* set <strong>of</strong> routes */and c=check_routes(r,S) /* ∃ valid route */and a=check_arrival(c) / destination reached */inif c!=nilthen let TM’= if a then TM else TM ∪ update(tr)and A’= if a then A ∪ tr else AinWormHSched(rest(L), TM’, A’, updateSt(S))else WormHSched(rest(L), TM ∪ tr, A, S)19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!