Skip to main content

Manipulations of FSMs Represented as Sequential Circuits

  • Chapter
  • First Online:
The Unknown Component Problem

Abstract

In many cases, hard computational problems can be reformulated using decomposition and partitioning, which can lead to computational advantages. An example is image computation, which is a core computation in formal verification. In its simplest form, the image of a set of states is computed using the formula:

$$\begin{array}{rcl} Img(ns) = {\exists }_{i,cs}\ [T(i,cs,ns)\,.\,\xi (cs)],& & \\ \end{array}$$

where T(i, cs, ns) is the transition relation, ξ(cs) is the set of current states, i is the set of input variables, and cs(ns) is the set of current (next) state variables. The image, Img(ns), is the set of states reachable in one transition under all possible inputs from the current states, ξ(cs), using the state transition structure given by T(i, cs, ns).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We do not distinguish between sets, relations, and their characteristic functions. Therefore, it is possible to think of ξ(cs), Img(ns), and T(i, cs, ns) as completely specified Boolean functions represented using e.g. BDDs.

  2. 2.

    In this section, we will illustrate the concepts using next state functions, but the computations also work for the case of non-deterministic relations.

  3. 3.

    The results of this chapter are not limited to the particular topology of Fig. 7.1, but we confine the discussion to that of Fig. 7.1 for ease of presentation.

  4. 4.

    It is beyond the scope of this book to describe all these advancements; we experimented extensively with implementing most of proposed techniques and chose the methods that we observed to be most efficient.

  5. 5.

    Note that it is not necessary to compute subset states which emanate from such a state since once reached, we know that all input sequences with this prefix are not in the language of an FSM.

  6. 6.

    While this trimming can be substantial, there is no avoiding that subset construction can be exponential. However, a common experience among people who have implemented subset construction, is that it can be surprisingly efficient in practice, with relatively few subset states reached, sometimes even leading to a reduction in the number of states.

  7. 7.

    Say that an MV network has two binary latches and that under some input both latches produce both 1 and 0. Does this situation correspond to the subset of states (00, 11), or (01, 10) or (00, 11, 10) ? To avoid loss of information we should introduce additional input variables to distinguish the situations. This is an unexplored area of synthesis.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tiziano Villa .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Villa, T., Yevtushenko, N., Brayton, R.K., Mishchenko, A., Petrenko, A., Sangiovanni-Vincentelli, A. (2012). Manipulations of FSMs Represented as Sequential Circuits. In: The Unknown Component Problem. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68759-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68759-9_7

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-34532-1

  • Online ISBN: 978-0-387-68759-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics