共 16 条
[1]
Ackerman D.F., Decker M.H., Gosselin J.J., Lasko K.M., Mullen M.P., Rosa R.E., Valera E.V., Wile B., Simulation of IBM Enterprise System/9000 models 820 and 900, IBM J. Res. Develop., 36, 4, pp. 751-764, (1992)
[2]
Aharon A., Bar-David A., Dorfman B., Gofman E., Leibowitz M., Schwartzburd V., Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator, IBM Syst. J., 30, 4, pp. 527-538, (1991)
[3]
Alter J.I., DACCT—Dynamic access testing of IBM large systems, Proc. IEEE Int. Conf. Comput. Des., pp. 240-244, (1992)
[4]
Beizer B., Chapter 6. Domain testing, Software Testing Techniques. New York: Van Nostrand-Reinhold, (1990)
[5]
Chandra A.K., Iyengar V.S., Constraint solving for test case generation—A technique for high level design verification, Proc. IEEE Int. Conf. Comput. Des., pp. 245-248, (1992)
[6]
Chandra A.K., Iyengar V.S., Jawalekar R.V., Mullen M.P., Nair I., Rosen B.K., Architectural verification of processors using symbolic instruction graphs, Proc. IEEE Int. Conf. Comput. Des., pp. 454-459, (1994)
[7]
Cormen T.H., Leiserson C.E., Rivest R.L., Introduction to Algorithms. Cambridge, (1990)
[8]
Heller D., Motif Programming Manual. Sebastopol, (1991)
[9]
Jones D., Yang R., Kwong M., Harper G., Verification techniques for a MIPS compatible embedded control processor, Proc. IEEE Int. Conf Comput. Des., pp. 329-332, (1991)
[10]
Joyce J.J., Formal verification and implementation of a microprocessor, VLSI Specification, pp. 129-157, (1988)