{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:16:28Z","timestamp":1729628188633,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/idt.2011.6123100","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:00:45Z","timestamp":1326301245000},"page":"48-52","source":"Crossref","is-referenced-by-count":0,"title":["Validation &amp;amp; Verification of an EDA automated synthesis tool"],"prefix":"10.1109","author":[{"given":"Stefano","family":"Di Carlo","sequence":"first","affiliation":[]},{"given":"Giulio","family":"Gambardella","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Indaco","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Rolfo","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Prinetto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675150"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MTDT.2002.1029769"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2005.56"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/54.199799"},{"journal-title":"Nios Development Board Cyclone II Edition Reference Manual","year":"2007","key":"ref37"},{"journal-title":"ML403 Evaluation Platform","year":"2006","key":"ref36"},{"journal-title":"Nios II Processor Reference Handbook","year":"2007","key":"ref35"},{"journal-title":"MicroBlaze Processor Reference Guide","year":"2004","key":"ref34"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1090\/psapm\/019\/0235771","article-title":"Assigning meanings to programs","volume":"19","author":"floyd","year":"1967","journal-title":"Proc of the 20th Symposium on Applied Mathematics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380150504"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/356674.356677"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231144"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380080402"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1040291.1040292"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/3-540-44829-2_17","article-title":"Software verification with blast","author":"henzinger","year":"2003","journal-title":"Proc 10th Int'l Conf Model Checking Software"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cds:19971147"},{"key":"ref4","first-page":"392","article-title":"One evaluation of model-based testing and its automation","author":"pretschner","year":"2005","journal-title":"Proc of the 27th International Conference on Software Engineering"},{"key":"ref27","first-page":"493","article-title":"Mats+ transparent memory test for pattern sensitive fault detection","author":"mrozek","year":"2008","journal-title":"Proc Int Conf Mixed Design of Integrated Circuits and System"},{"journal-title":"Software Engineering Economics","year":"1981","author":"boehm","key":"ref3"},{"journal-title":"Compilers Principles Techniques and Tools","year":"1986","author":"aho","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VTEST.1996.510868"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/210134.210180"},{"key":"ref8","first-page":"235","article-title":"Data-flow analysis of program fragments","author":"rountev","year":"1999","journal-title":"Proc of the 7th European Software Engineering Conference held jointly with the 7th ACM SIGSOFT International Symposium on Foundations of software engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/125489.122822"},{"journal-title":"Art of Software Testing","year":"1979","author":"myers","key":"ref2"},{"journal-title":"Software Testing and Analysis Process Principles and Techniques","year":"2005","author":"young","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379665"},{"journal-title":"SPIN Model Checker The Primer and Reference Manual","year":"2003","author":"holzmann","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2011.6116421"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2011.78"},{"key":"ref24","first-page":"157","author":"di carlo","year":"2010","journal-title":"Models in Hardware Testing ch Models in Memory Testing From functional testing to defect-based testing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.68"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2008.60"}],"event":{"name":"2011 IEEE 6th International Design and Test Workshop (IDT)","start":{"date-parts":[[2011,12,11]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2011,12,14]]}},"container-title":["2011 IEEE 6th International Design and Test Workshop (IDT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111737\/6123091\/06123100.pdf?arnumber=6123100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T06:33:31Z","timestamp":1561185211000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6123100\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/idt.2011.6123100","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}