Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gary A. Van Huben.
Ibm Journal of Research and Development | 1997
Gary A. Van Huben
Microprocessor design techniques have evolved to a point where large systems, such as S/390® servers, can be constructed using relatively few, but very complex, application-specific integrated circuits (ASICs). Delivery of a quality design in a timely fashion requires that several design activities progress simultaneously, with different types of verification used within the various design disciplines. This paper discloses a simulation method capable of functionally verifying a physical implementation of the design at a system level. The aggressive design schedule undertaken on the S/390 Parallel Enterprise Server G4 program required additional advances in simulation beyond those employed in the development of the IBM Enterprise System/9000® (ES/9000®) processor family. A new type of cycle simulation was developed to supplement the incumbent strategy of using conventional cycle simulation to verify system function combined with Boolean equivalence tools to perform logical-to-physical comparisons. This two-cycle simulation method was invented to verify areas such as logic built-in self-test (LBIST), array built-in self-test (ABIST), clock trees, firmware level-sensitive scan design (LSSD) rings, and large custom arrays, which are typically omitted by existing system verification methods. The creation of the two-cycle simulation model is discussed, along with several uses of the model and the types of errors uncovered.
formal methods in computer-aided design | 2007
Adrian E. Seigler; Gary A. Van Huben; Hari Mony
The concept of applying partial fencing to logic built-in self test (LBIST) hardware structures for the purpose of using partially good chips is well known in the chip design industry. Deceptively difficult though is the task of verifying that any particular implementation of partial fencing logic actually provides the desired behavior of blocking down-stream impact of all signals from fenced interfaces, and also ensuring that the partial fencing does not inadvertently preclude any common logic from being fully tested. In this paper we discuss a case study for a verification method which exploits the power of formal verification to prove that any given partial fencing design satisfies all behavioral expectations. We describe the details of the verification method and discuss the benefits of using this approach versus using traditional simulation methods. We also discuss the testbenches created as part of applying this new method. Furthermore, we discuss the formal verification algorithms that were employed during application of the method along with the tuning that was done to enable efficient completion of the verification tasks at hand.
Archive | 1998
Gary A. Van Huben; Joseph Lawrence Mueller
Archive | 1999
Gary A. Van Huben; Joseph Lawrence Mueller
Archive | 1997
Gary A. Van Huben; Joseph Lawrence Mueller
Archive | 1996
Gary A. Van Huben; Joseph Lawrence Mueller; Steve Yun Xiao; Joyce Chang Mak
Archive | 1996
Gary A. Van Huben; Joseph Lawrence Mueller; Michael Steven Siegel; Thomas Bernard Warnock; Darryl James McDonald
Archive | 1996
Gary A. Van Huben; Joseph Lawrence Mueller
Archive | 1996
Gary A. Van Huben; Joseph Lawrence Mueller
Archive | 2000
Gary A. Van Huben; Joseph Lawrence Mueller