AbstractOptimizing programs by applying source-to-source transformations is a prevalent practice among programmers. Particularly so, in the framework of methodology based embedded systems design, where the initial program is subject to a series of transformations to optimize computation and communication. In the context of parallelization and custom memory design, such transformations are applied on the loop structures and index expressions of array variables in the program, more often manually than with a tool, leading to the non-trivial problem of checking their correctness. Applied transformations are semantics preserving if the transformed program is functionally equivalent to the initial program from the input-output point of view. In ...
The issue of correctness in the context of a certain style of program transformation is investigated...
International audienceHigh-level compiler transformations, especially loop transformations, are wide...
In this abstract we present an overview of our intended approach for the verification of software wr...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
AbstractOptimizing programs by applying source-to-source transformations is a prevalent practice amo...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embed-ded software is increasingly relying on applic...
© 2003 IEEE. In this paper, we present a fully automatic technique to verify an important class of o...
Abstract. Typically, a combination of manual and automated transformations is applied when algorithm...
In model-based software development, a complete design and analysis process involves designing the s...
AbstractIn model-based software development, a complete design and analysis process involves designi...
AbstractA program checker verifies that a particular program execution is correct. We give simple an...
We show how the problem of verifying parameterized systems can be reduced to the problem of determin...
The issue of correctness in the context of a certain style of program transformation is investigated...
International audienceHigh-level compiler transformations, especially loop transformations, are wide...
In this abstract we present an overview of our intended approach for the verification of software wr...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
AbstractOptimizing programs by applying source-to-source transformations is a prevalent practice amo...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embed-ded software is increasingly relying on applic...
© 2003 IEEE. In this paper, we present a fully automatic technique to verify an important class of o...
Abstract. Typically, a combination of manual and automated transformations is applied when algorithm...
In model-based software development, a complete design and analysis process involves designing the s...
AbstractIn model-based software development, a complete design and analysis process involves designi...
AbstractA program checker verifies that a particular program execution is correct. We give simple an...
We show how the problem of verifying parameterized systems can be reduced to the problem of determin...
The issue of correctness in the context of a certain style of program transformation is investigated...
International audienceHigh-level compiler transformations, especially loop transformations, are wide...
In this abstract we present an overview of our intended approach for the verification of software wr...