In tuning data-intensive software such as multimedia and telecom applications for embedded processors in portable devices, designers use a combination of automated and manual transformations at the source level to optimize the resource consumption of the software. It is of crucial importance that the functionality of the software is preserved. For software with static control, a verification method exists that first transforms the code into dynamic single assignment form and next verifies the functional equivalence of the two versions. The verification is based on geometric modelling using polyhedra. In this paper, we describe in detail the basic operations of the verification method, discuss the control issues that affect its overall perfo...
This paper surveys recent work on applying analysis and transformation techniques that originate in ...
work presented in the context of the European Master’s program in Computational Logic, as the part...
© 2003 IEEE. In this paper, we present a fully automatic technique to verify an important class of o...
In tuning data-intensive software such as multimedia and telecom applications for embedded processor...
Software plays an important role in our daily lives. There is software in our cell phones, in our wo...
Abstract. Verification and validation are two of the most critical issues in the software engineerin...
Abstract. Program verification relies on the construction of auxiliary assertions describing various...
In the world that we live in today, we greatly rely on software in nearly every aspect of our lives....
Verification and validation (V&V) are two components of the software engineering process that are cr...
As application systems live longer and grow in size and complexity, there is an ever increasing need...
In recent days, the complexity of software has increased significantly in embedded products in such ...
Verification and validation (V&V) are two components of the software engineering process that are cr...
Abstract. We describe the design and implementation of an automatic invariant generator for imperati...
Many safety-critical cyber-physical systems have a software-based controller at their core. Since th...
Part 5: ARAMIS Special SessionInternational audienceWith the introduction of multicore hardware to e...
This paper surveys recent work on applying analysis and transformation techniques that originate in ...
work presented in the context of the European Master’s program in Computational Logic, as the part...
© 2003 IEEE. In this paper, we present a fully automatic technique to verify an important class of o...
In tuning data-intensive software such as multimedia and telecom applications for embedded processor...
Software plays an important role in our daily lives. There is software in our cell phones, in our wo...
Abstract. Verification and validation are two of the most critical issues in the software engineerin...
Abstract. Program verification relies on the construction of auxiliary assertions describing various...
In the world that we live in today, we greatly rely on software in nearly every aspect of our lives....
Verification and validation (V&V) are two components of the software engineering process that are cr...
As application systems live longer and grow in size and complexity, there is an ever increasing need...
In recent days, the complexity of software has increased significantly in embedded products in such ...
Verification and validation (V&V) are two components of the software engineering process that are cr...
Abstract. We describe the design and implementation of an automatic invariant generator for imperati...
Many safety-critical cyber-physical systems have a software-based controller at their core. Since th...
Part 5: ARAMIS Special SessionInternational audienceWith the introduction of multicore hardware to e...
This paper surveys recent work on applying analysis and transformation techniques that originate in ...
work presented in the context of the European Master’s program in Computational Logic, as the part...
© 2003 IEEE. In this paper, we present a fully automatic technique to verify an important class of o...