{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T21:01:07Z","timestamp":1751662867565},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388552"},{"type":"electronic","value":"9783642388569"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38856-9_17","type":"book-chapter","created":{"date-parts":[[2013,6,15]],"date-time":"2013-06-15T00:05:28Z","timestamp":1371254728000},"page":"304-323","source":"Crossref","is-referenced-by-count":27,"title":["Witnessing Program Transformations"],"prefix":"10.1007","author":[{"given":"Kedar S.","family":"Namjoshi","sequence":"first","affiliation":[]},{"given":"Lenore D.","family":"Zuck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Lamport, L.: The existence of refinement mappings. Theor. Comput. Sci.\u00a082(2), 253\u2013284 (1991)","journal-title":"Theor. Comput. Sci."},{"key":"17_CR2","unstructured":"Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures. Morgan Kaufmann (2002)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-35722-0_3","volume-title":"Logical Foundations of Computer Science","author":"G. Barthe","year":"2013","unstructured":"Barthe, G., Crespo, J.M., Kunz, C.: Beyond 2-safety: Asymmetric product programs for relational program verification. In: Artemov, S., Nerode, A. (eds.) LFCS 2013. LNCS, vol.\u00a07734, pp. 29\u201343. Springer, Heidelberg (2013)"},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1985342.1985344","volume":"33","author":"G. Barthe","year":"2011","unstructured":"Barthe, G., Kunz, C.: An abstract model of certificate translation. ACM Trans. Program. Lang. Syst.\u00a033(4), 13 (2011)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Benton, N.: Simple relational correctness proofs for static analyses and program transformations. In: POPL, pp. 14\u201325 (2004)","DOI":"10.1145\/982962.964003"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/0890-5401(89)90026-6","volume":"81","author":"M.C. Browne","year":"1989","unstructured":"Browne, M.C., Clarke, E.M., Grumberg, O.: Reasoning about networks with many identical finite state processes. Inf. Comput.\u00a081(1), 13\u201331 (1989)","journal-title":"Inf. Comput."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Dijkstra, E.: Guarded commands, nondeterminacy, and formal derivation of programs. CACM\u00a018(8) (1975)","DOI":"10.1145\/360933.360975"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Dijkstra, E., Scholten, C.: Predicate Calculus and Program Semantics. Springer (1990)","DOI":"10.1007\/978-1-4612-3228-5"},{"key":"17_CR9","unstructured":"Lattner, C., Adve, V.S.: LLVM: A compilation framework for lifelong program analysis & transformation. In: CGO, pp. 75\u201388 (2004), Webpage at \n                  \n                    llvm.org"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Leroy, X.: Formal certification of a compiler back-end or: programming a compiler with a proof assistant. In: POPL, pp. 42\u201354. ACM (2006)","DOI":"10.1145\/1111320.1111042"},{"issue":"7","key":"17_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1538788.1538814","volume":"52","author":"X. Leroy","year":"2009","unstructured":"Leroy, X.: Formal verification of a realistic compiler. Commun. ACM\u00a052(7), 107\u2013115 (2009)","journal-title":"Commun. ACM"},{"key":"17_CR12","unstructured":"Manna, Z., McCarthy, J.: Properties of programs and partial function logic. Journal of Machine Intelligence\u00a05 (1970)"},{"key":"17_CR13","unstructured":"Manolios, P.: Mechanical Verification of Reactive Systems. PhD thesis, University of Texas at Austin (2001)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-540-39724-3_28","volume-title":"Correct Hardware Design and Verification Methods","author":"P. Manolios","year":"2003","unstructured":"Manolios, P.: A compositional theory of refinement for branching time. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol.\u00a02860, pp. 304\u2013318. Springer, Heidelberg (2003)"},{"key":"17_CR15","volume-title":"Advanced Compiler Design & Implementation","author":"S. Muchnick","year":"1997","unstructured":"Muchnick, S.: Advanced Compiler Design & Implementation. Morgan Kaufmann, San Francisco (1997)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/BFb0058037","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"K.S. Namjoshi","year":"1997","unstructured":"Namjoshi, K.S.: A simple characterization of stuttering bisimulation. In: Ramesh, S., Sivakumar, G. (eds.) FST TCS 1997. LNCS, vol.\u00a01346, pp. 284\u2013296. Springer, Heidelberg (1997)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-36384-X_16","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"K.S. Namjoshi","year":"2002","unstructured":"Namjoshi, K.S.: Lifting temporal proofs through abstractions. In: Zuck, L.D., Attie, P.C., Cortesi, A., Mukhopadhyay, S. (eds.) VMCAI 2003. LNCS, vol.\u00a02575, pp. 174\u2013188. Springer, Heidelberg (2002)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Necula, G.: Translation validation of an optimizing compiler. In: Proceedings of the ACM SIGPLAN Conference on Principles of Programming Languages Design and Implementation, PLDI 2000, pp. 83\u201395 (2000)","DOI":"10.1145\/349299.349314"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Necula, G.C., Lee, P.: Safe kernel extensions without run-time checking. In: OSDI, pp. 229\u2013243. ACM (1996)","DOI":"10.1145\/248155.238781"},{"issue":"2","key":"17_CR20","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/s100090050027","volume":"2","author":"A. Pnueli","year":"1998","unstructured":"Pnueli, A., Siegel, M., Shtrichman, O.: The code validation tool (CVT)- automatic verification of a compilation process. Software Tools for Technology Transfer\u00a02(2), 192\u2013201 (1998)","journal-title":"Software Tools for Technology Transfer"},{"key":"17_CR21","unstructured":"Rinard, M., Marinov, D.: Credible compilation with pointers. In: Proceedings of the Run-Time Result Verification Workshop (July 2000)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Tristan, J.-B., Govereau, P., Morrisett, G.: Evaluating value-graph translation validation for LLVM. In: PLDI, pp. 295\u2013305 (2011)","DOI":"10.1145\/1993316.1993533"},{"issue":"3","key":"17_CR23","first-page":"223","volume":"9","author":"L.D. Zuck","year":"2003","unstructured":"Zuck, L.D., Pnueli, A., Goldberg, B.: Voc: A methodology for the translation validation of optimizing compilers. J. UCS\u00a09(3), 223\u2013247 (2003)","journal-title":"J. UCS"},{"issue":"3","key":"17_CR24","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10703-005-3402-z","volume":"27","author":"L.D. Zuck","year":"2005","unstructured":"Zuck, L.D., Pnueli, A., Goldberg, B., Barrett, C.W., Fang, Y., Hu, Y.: Translation and run-time validation of loop transformations. Formal Methods in System Design\u00a027(3), 335\u2013360 (2005)","journal-title":"Formal Methods in System Design"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38856-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:48:41Z","timestamp":1557794921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38856-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388552","9783642388569"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38856-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}