© 2003 IEEE. In this paper, we present a fully automatic technique to verify an important class of optimizing program transformations applied to reduce accesses to the data memory. These are prevalent while developing software for power and performance-efficient embedded multimedia systems. The verification of the transformations relies on an automatic proof of functional equivalence of the initial and the transformed program functions. It is based on extracting and reasoning on the polyhedral models representing the dependencies between the elements of the output and the input variables, which are preserved under the transformations considered. If the verification reports failure, the technique also identifies the errors and their location...
We present a transformational approach to program verification and software model checking that uses...
Programmers of embedded systems often develop software in assembly code due to inadequate support fr...
Software developers, compiler designers, and formal methods researchers all stand to benefit from im...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embed-ded software is increasingly relying on applic...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
AbstractOptimizing programs by applying source-to-source transformations is a prevalent practice amo...
The issue of correctness in the context of a certain style of program transformation is investigated...
Abstract. Typically, a combination of manual and automated transformations is applied when algorithm...
Abstract. Programmers of embedded systems often develop software in assembly code due to critical sp...
In tuning data-intensive software such as multimedia and telecom applications for embedded processor...
The incorporation of a recovery algorithm into a program can be viewed as a program transformation, ...
In tuning data-intensive software such as multimedia and telecom applications for embedded processor...
We present a transformational approach to program verification and software model checking that uses...
Programmers of embedded systems often develop software in assembly code due to inadequate support fr...
Software developers, compiler designers, and formal methods researchers all stand to benefit from im...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embed-ded software is increasingly relying on applic...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
AbstractOptimizing programs by applying source-to-source transformations is a prevalent practice amo...
The issue of correctness in the context of a certain style of program transformation is investigated...
Abstract. Typically, a combination of manual and automated transformations is applied when algorithm...
Abstract. Programmers of embedded systems often develop software in assembly code due to critical sp...
In tuning data-intensive software such as multimedia and telecom applications for embedded processor...
The incorporation of a recovery algorithm into a program can be viewed as a program transformation, ...
In tuning data-intensive software such as multimedia and telecom applications for embedded processor...
We present a transformational approach to program verification and software model checking that uses...
Programmers of embedded systems often develop software in assembly code due to inadequate support fr...
Software developers, compiler designers, and formal methods researchers all stand to benefit from im...