Multi-Armed Bandits for Autonomous Test Application in RISC-V Processor Verification.

Giorgos Dimitrakopoulos, E. Kallitsounakis, Z. Takakis, A. Stefanidis,Chrysostomos Nicopoulos

MOCAST(2023)

引用 0|浏览14
暂无评分
摘要
Multi-armed bandit problems have recently received a great deal of attention, because they adequately formalize so called exploration-exploitation trade-offs arising in several relevant applications of recommendation systems. In this article, the multi-armed bandit concept is applied to an equivalent problem within the context of hardware verification. Specifically, a verification recommendation system is designed, based on the multi-armed bandit decision-making model, to automatically suggest which test sequences - constrained-random or direct - should be applied during processor verification. Automating the process of test application not only improves functional coverage, as shown by the experimental results for a two-way superscalar out-of-order RISC-V processor, but it also minimizes the verification effort and, in effect, shortens the time to market.
更多
查看译文
关键词
Multi-armed bandits,Verification,Functional coverage,Reinforcement learning,RISCV Processor
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要