{"id":"https://openalex.org/W7133545831","doi":"https://doi.org/10.48550/arxiv.2603.03147","title":"Agentic AI-based Coverage Closure for Formal Verification","display_name":"Agentic AI-based Coverage Closure for Formal Verification","publication_year":2026,"publication_date":"2026-03-03","ids":{"openalex":"https://openalex.org/W7133545831","doi":"https://doi.org/10.48550/arxiv.2603.03147"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.03147","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.03147","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.03147","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128075031","display_name":"Sivaram Pothireddypalli","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pothireddypalli, Sivaram","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035286081","display_name":"Ashish Raman","orcid":"https://orcid.org/0000-0002-6720-373X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raman, Ashish","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094261345","display_name":"Deepak Narayan Gadde","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gadde, Deepak Narayan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5128085889","display_name":"Aman Kumar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kumar, Aman","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5128075031"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.43869999051094055,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.43869999051094055,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11522","display_name":"VLSI and FPGA Design Techniques","score":0.3303000032901764,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.07890000194311142,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.6093999743461609},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.54830002784729},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5029000043869019},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4921000003814697},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.48829999566078186},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.4853000044822693},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.41940000653266907},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.3939000070095062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7433000206947327},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.6093999743461609},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.54830002784729},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5029000043869019},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4921000003814697},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.48829999566078186},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.4853000044822693},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.3939000070095062},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.3926999866962433},{"id":"https://openalex.org/C146834321","wikidata":"https://www.wikidata.org/wiki/Q2979672","display_name":"Closure (psychology)","level":2,"score":0.391400009393692},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.373199999332428},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.3547999858856201},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.3255999982357025},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.295199990272522},{"id":"https://openalex.org/C146499914","wikidata":"https://www.wikidata.org/wiki/Q5469969","display_name":"Formal semantics (linguistics)","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.2728999853134155},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2614000141620636}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.03147","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.03147","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.03147","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.03147","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5817620158195496}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Coverage":[0],"closure":[1],"is":[2],"a":[3,79],"critical":[4],"requirement":[5],"in":[6,82],"Integrated":[7],"Chip":[8],"(IC)":[9],"development":[10],"process":[11],"and":[12,57,75,116],"key":[13],"metric":[14],"for":[15,51],"verification":[16,66,114],"sign-off.":[17],"However,":[18],"traditional":[19],"exhaustive":[20],"approaches":[21],"often":[22],"fail":[23],"to":[24,47,88,111],"achieve":[25],"full":[26],"coverage":[27,49,55,71,83,119],"within":[28],"project":[29],"timelines.":[30],"This":[31],"study":[32],"presents":[33],"an":[34],"agentic":[35,108],"AI-driven":[36],"workflow":[37],"that":[38],"utilizes":[39],"Large":[40],"Language":[41],"Model":[42],"(LLM)-enabled":[43],"Generative":[44],"AI":[45],"(GenAI)":[46],"automate":[48],"analysis":[50,95],"formal":[52,61,113],"verification,":[53],"identify":[54],"gaps,":[56],"generate":[58],"the":[59,89,92,97,105],"required":[60],"properties.":[62],"The":[63],"framework":[64],"accelerates":[65],"efficiency":[67],"by":[68],"systematically":[69],"addressing":[70],"holes.":[72],"Benchmarking":[73],"open-source":[74],"internal":[76],"designs":[77],"reveals":[78],"measurable":[80],"increase":[81],"metrics,":[84],"with":[85],"improvements":[86],"correlated":[87],"complexity":[90],"of":[91,99,107],"design.":[93],"Comparative":[94],"validates":[96],"effectiveness":[98],"this":[100],"approach.":[101],"These":[102],"results":[103],"highlight":[104],"potential":[106],"AI-based":[109],"techniques":[110],"improve":[112],"productivity":[115],"support":[117],"comprehensive":[118],"closure.":[120]},"counts_by_year":[],"updated_date":"2026-03-05T07:36:02.291473","created_date":"2026-03-05T00:00:00"}
