Formal Verification of Transformations for Peephole Optimization (1997)

Cached

Download Links

by A. Dold , F. W. Von Henke , H. Pfeifer , H. Rueß
Venue:IN FME '97: FORMAL METHODS: THEIR INDUSTRIAL APPLICATION AND STRENGTHENED FOUNDATIONS, LECTURE NOTES IN COMPUTER SCIENCE
Citations:3 - 1 self

Active Bibliography

1 Generic Compilation Schemes for Simple Programming Constructs – A. Dold, F. W. Von Henke, H. Pfeifer, H. Rueß - 1999
14 An introduction to requirements capture using pvs: Specification of a simple autopilot – Ricky W. Butler - 1996
16 Quick Compilers Using Peephole Optimization – Jack W. Davidson, David, David B. Whalley - 1989
4 A Hierarchical Method for Reasoning about Distributed Programming Languages – Cui Zhang, Brian R. Becker, Mark R. Heckman, Karl Levitt, Ron A. Olsson - 1995
15 Automatic Generation of Fast Optimizing Code Generators – Christopher W. Fraser, et al. - 1988
1 An Implementation of the Haskell Language – Diomidis Spinellis - 1990
Detecting Bugs in Register Allocation – Yuqiang Huang, Bruce R. Childers, Mary Lou Soffa
8 Catching and identifying bugs in register allocation – Yuqiang Huang, Bruce R. Childers, Mary Lou Soffa - 2006
7 Semantics-Directed Code Generation – Andrew W. Appel - 1985
Signature of Author........................................................... – Tom Crick, Tom Crick Acknowledgements, Tristan Caulfield, Matthew Collinson, Yi-zhe Song, Manu Tanguy, Adam Dziedzic - 2009
70 Code selection through object code optimization – Jack W. Davidson, Christopher W. Fraser - 1984
Ia-64 Code Generation – Vikram North Carolina, Vikram S. Rao
10 Supporting FPGA Microprocessors through Retargetable Software Tools – David A. Clark, Brad L. Hutchings - 1996
5 Fast Peephole Optimization Techniques – B. J. Mckenzie, B. J. Mckenzie - 1988
3 CSDL: Reusable Computing System Descriptions for Retargetable System Software – Mark W. Bailey, John Knight, Ronald Williams - 2000
LVT: A Layered Verification Technique for Distributed Computing Systems – Cui Zhang, Brian R. Becker, Dave Peticolas, Ronald A. Olsson, Karl N. Levitt - 1999
8 Embedding CSP in PVS. An Application to Authentication Protocols – Bruno Dutertre, Steve Schneider - 1997
1 Mechanizing Domain Theory – F. Bartels, H. Pfeifer, F. von Henke, H. Rue - 1996
The Priority Ceiling Protocol: Formalization and Analysis Using PVS\Lambda – unknown authors - 1999