07.01.2013 Views

Lecture Notes in Computer Science 3472

Lecture Notes in Computer Science 3472

Lecture Notes in Computer Science 3472

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

390 Part IV. Tools and Case Studies<br />

<strong>in</strong>clude processor architectures, protocols, operat<strong>in</strong>g systems, and smart cards.<br />

In particular, they are <strong>in</strong>terested <strong>in</strong> the underly<strong>in</strong>g abstraction mechanisms—<br />

a result of the observation that the endeavor of check<strong>in</strong>g a system aga<strong>in</strong>st a<br />

model at the same level of abstraction is a dubious endeavor, because the model<br />

has to be validated. Roughly, the bottom l<strong>in</strong>e of this article is that model-based<br />

test<strong>in</strong>g is particularly successful <strong>in</strong> doma<strong>in</strong>s where predef<strong>in</strong>ed levels of abstraction<br />

(VHDL, RTL) exist.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!