Coverage Modeling For Verification Of Floating Point Arithmetic Units
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Scope displaying is one of the key errands of the confirmation stream in frameworks improvement. The subsequent model is regularly used to assess the advancement and nature of the check process; it likewise gives a valuable deliberation to the era of test vector designs. This work shows a heuristic methodology for scope model definition in view of the ideas of equality classes and limit esteem investigation to address the check of skimming point number juggling units. As a contextual investigation, a scope model was intended to confirm the ADD operation of a drifting point module for the binary16 number configuration characterized in the IEEE 754-2008 standard, and a System Verilog test seat was actualized to perform the check process. The adequacy of the heuristic and the nature of the subsequent model are broke down by measuring the scope acquired in the execution of an outsider test suite, and by creating an arrangement of test vectors from the model and invigorating an outline under confirmation (DUV) to recognize bugs for configuration survey.
Authors and Affiliations
T. Seshagiri, T. Vishnu Murthy
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...
Efficient Data Gathering with Mobile Collectors and Space-DMA Technique in Wireless Sensor Networks
Now a day’s efficient data gathering scheme in wireless sensor networks is has got more attention towards the research and development. This issue is taken care by using adopting mobility and Space Division Multiple...
Seclusiveness Jamming Attacks Using Packet Hiding Method
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with...
Secured Diversified Data set Selection From Dynamic Data
Once the data is created, the data that it contains doesn’t change is known as static data (ex: newspaper).Where as the data can be change and update in the dynamic data (ex: website). A lot of information available...
A Formal Study of Cryptanalysis on Ciphers
Cryptanalysis is co-study of cryptography. A cipher is said to be successful cipher if it design resists all cipher attacks. Cryptanalyis are two-fold. One way is a benign activity where cryptanalysis is performed to...