A Pipelined Multi-core MIPS Machine: Hardware Implementation by Mikhail Kovalev, Silvia M. Müller, Wolfgang J. Paul

By Mikhail Kovalev, Silvia M. Müller, Wolfgang J. Paul

This monograph is predicated at the 3rd author's lectures on laptop structure, given in the summertime semester 2013 at Saarland college, Germany. It incorporates a gate point building of a multi-core computing device with pipelined MIPS processor cores and a sequentially constant shared memory.

The e-book includes the 1st correctness proofs for either the gate point implementation of a multi-core processor and likewise of a cache established sequentially constant shared reminiscence. This opens easy methods to the formal verification of synthesizable for multi-core processors within the future.

Constructions are in a gate point version and hence deterministic. by contrast the reference types opposed to which correctness is proven are nondeterministic. the advance of the extra equipment for those proofs and the correctness evidence of the shared reminiscence on the gate point are the most technical contributions of this work.

Show description

Read or Download A Pipelined Multi-core MIPS Machine: Hardware Implementation and Correctness Proof PDF

Similar compilers books

Introduction to Assembly Language Programming: For Pentium and RISC Processors

This textbook introduces the reader to meeting language programming and its function in machine programming and layout. the focal point is on offering scholars with an organization grab of the most beneficial properties of meeting programming, and the way it may be used to enhance a computer's functionality. The revised version covers a extensive scope of topics and provides helpful fabric on protected-mode Pentium programming, MIPS meeting language programming, and use of the NASM and SPIM assemblers for a Linux orientation.

Agent-Oriented Programming: From Prolog to Guarded Definite Clauses

A booklet that furnishes no quotations is, me judice, no e-book – it's a plaything. TL Peacock: Crochet citadel The paradigm provided during this ebook is proposed as an agent programming language. The booklet charts the evolution of the language from Prolog to clever brokers. To a wide volume, clever brokers rose to prominence within the mid-1990s a result of world-wide-web and an ill-structured community of multimedia info.

Using Microsoft Dynamics AX 2012: Updated for Version R3

Distinct descriptions and directions permit clients, scholars and experts to appreciate MS Dynamics AX 2012 speedily. Microsoft deals Dynamics AX as its top class ERP resolution, helping huge and mid-sized firms with a whole company administration resolution that's effortless to exploit. facing an easy yet finished case learn – the pattern corporation ‘Anso applied sciences Inc.

Fast track to MDX

Presents the historical past had to write worthwhile MDX expressions. This e-book introduces the main often used MDX capabilities and constructs. No previous wisdom is thought and examples are used all through to advance MDX abilities to the purpose the place they could remedy genuine company difficulties. it's also a CD-ROM and a model of ProClarity.

Extra resources for A Pipelined Multi-core MIPS Machine: Hardware Implementation and Correctness Proof

Example text

N-bit zero tester a a b b n n n n n n-eq 1 n-Zero 1 eq neq 1 eq (a) symbol 1 neq (b) implementation Fig. 13. n-bit equality tester The inputs a[n − 1 : 0], b[n − 1 : 0] and outputs eq, neq of an n-bit equality tester in Fig. 13 satisfy eq ≡ a = b , neq ≡ a = b . The implementation uses neq(a[n − 1 : 0]) = nzero(a[n − 1 : 0] ⊕ b[n − 1 : 0]) , eq = neq . An n-decoder is a circuit with inputs x[n − 1 : 0] and outputs y[2n − 1 : 0] satisfying ∀i : yi = 1 ↔ x = i . A recursive construction with k = one argues in the induction step n 2 is shown in Fig.

Proof. The direction from left to right is trivial. For the other direction we distinguish cases: • • e(a) = 1. Then e (a) = 1 by hypothesis. e(a) = 0. Then e (a) = 1 would by hypothesis imply the contradiction e(a) = 1. Because in Boolean algebra e (a) ∈ B we conclude e (a) = 0. Thus, we have e(a) = e (a) for all a ∈ Bn . 1 Identities In this section we provide a list of useful identities of Boolean algebra. 6 Boolean Algebra 25 Table 4. Verifying the first of de Morgan’s laws x1 0 0 1 1 • x1 ∧ x2 0 0 0 1 x2 0 1 0 1 x1 ∧ x2 1 1 1 0 x1 1 1 0 0 x2 1 0 1 0 x1 ∨ x2 1 1 1 0 De Morgan’s laws: x1 ∧ x2 ≡ x1 ∨ x2 x1 ∨ x2 ≡ x1 ∧ x2 Each of these identities can be proven in a simple brute force way: if the identity has n variables, then for each of the 2n possible substitutions of the variables the left and right hand sides of the identities are evaluated with the help of Table 3.

2. 1 In the design from [12] the glitches can be produced on the instruction memory address by the multiplexer between pc and dpc as described in Chap. 7. 1 Digital Gates and Circuits ab ab a a∧b a∨b b a a⊕b a ¯ 31 Fig. 2. Symbols for gates in circuit schematics 1 Inputs 0 x0 x1 ... xn−1 wires and gates y0 y1 Outputs ... yt−1 Fig. 3. Illustration of inputs and outputs of a circuit C A circuit C consists of a finite set G of gates2 , a sequence of input signals x[n − 1 : 0], a set N of wires that connect them, as well as a sequence of output signals y[t − 1 : 0] ⊆ Sig(C) chosen from all signals of circuit C (as illustrated in Fig.

Download PDF sample

Rated 4.55 of 5 – based on 22 votes