Searched for: subject%3A%22code%255C+transformation%22
(1 - 2 of 2)
document
Kortbeek, V. (author), Ghosh, Souradip (author), Hester, Josiah (author), Campanoni, Simone (author), Pawełczak, Przemysław (author)
Intermittently operating embedded computing platforms powered by energy harvesting require software frameworks to protect from errors caused by Write After Read (WAR) dependencies. A powerful method of code protection for systems with non-volatile main memory utilizes compiler analysis to insert a checkpoint inside each WAR violation in the...
conference paper 2022
document
Rouvoet, A.J. (author), Krebbers, R.J. (author), Visser, Eelco (author)
To avoid compilation errors it is desirable to verify that a compiler is type correct-i.e., given well-typed source code, it always outputs well-typed target code. This can be done intrinsically by implementing it as a function in a dependently typed programming language, such as Agda. This function manipulates data types of well-typed source...
journal article 2021