Sciweavers

1145 search results - page 136 / 229
» The Correctness of an Optimized Code Generation
Sort
View
TPHOL
2008
IEEE
15 years 6 months ago
Imperative Functional Programming with Isabelle/HOL
We introduce a lightweight approach for reasoning about programs involving imperative data structures using the proof assistant Isabelle/HOL. It is based on shallow embedding of pr...
Lukas Bulwahn, Alexander Krauss, Florian Haftmann,...
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
15 years 5 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
EUROPAR
2004
Springer
15 years 5 months ago
More Legal Transformations for Locality
Abstract. Program transformations are one of the most valuable compiler techniques to improve data locality. However, restructuring compilers have a hard time coping with data depe...
Cédric Bastoul, Paul Feautrier
ICESS
2004
Springer
15 years 5 months ago
Relating FFTW and Split-Radix
Recent work showed that staging and abstract interpretation can be used to derive correct families of combinatorial circuits, and illustrated this technique with an in-depth analys...
Oleg Kiselyov, Walid Taha
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
15 years 5 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian