{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:01:34Z","timestamp":1752537694668,"version":"3.41.2"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Design Automation for Embedded Systems"],"published-print":{"date-parts":[[2000,6]]},"DOI":"10.1023\/a:1008926807523","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T12:46:35Z","timestamp":1040561195000},"page":"153-177","source":"Crossref","is-referenced-by-count":0,"title":["A Machine State Transition Approach to Instruction Retargeting for Embedded Microprocessors"],"prefix":"10.1007","volume":"5","author":[{"given":"Ing-Jer","family":"Huang","sequence":"first","affiliation":[]},{"given":"Wen-Fu","family":"Kao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"262669_CR1","unstructured":"M. E. Benitez, J. W. Davidson: \u201cA Retargetable Code Improver,\u201d University of Virginia."},{"key":"262669_CR2","doi-asserted-by":"crossref","unstructured":"A. V. Aho, M. Ganapathi, S. W. K. Tjiang: \u201cCode Generation Using Tree Matching and Dynamic Programming,\u201d ACM Trans. on Programming Languages and Systems, Vol. 11,No. 4, Oct. 1989.","DOI":"10.1145\/69558.75700"},{"key":"262669_CR3","unstructured":"M. Corazao, M. Khalaf, L. Guerra, M. Potkonjak, J. Rabaey: \u201cInstruction Set Mapping for Performance Optimization,\u201d Proc. of ICCAD, Nov. 1993."},{"key":"262669_CR4","unstructured":"C. Liem, P. Paulin, M. Cornero, A. Jerraya: \u201cIndustrial Experience Using Rule-driven Retargetable Code Generation for Multimedia Applications,\u201d TIMA Laboratory and Central R&D."},{"key":"262669_CR5","doi-asserted-by":"crossref","unstructured":"C. Liem, Retargetable Compilers for Embedded Core Processors, Methods and Experiences in Industrial Applications. Kluwer Academic Publishers, 1997.","DOI":"10.1007\/978-1-4757-6422-2"},{"key":"262669_CR6","unstructured":"A. Sudarsanam, S. Malik: \u201cSimultaneous Reference Allocation in Code Generation for Dual Data-Memory Bank ASIPs,\u201d IEEE International Conference on CAD, 1995."},{"key":"262669_CR7","doi-asserted-by":"crossref","unstructured":"B. K. Holmer, A. M. Despain: \u201cViewing Instruction Set Design as an Optimization Problem,\u201d Proc. of MICRO-24, 1991.","DOI":"10.1145\/123465.123497"},{"key":"262669_CR8","series-title":"Technical Report","volume-title":"Can Logic Programming Execute as Fast as Imperative Programming","author":"P. L. Van Roy","year":"1990","unstructured":"P. L. Van Roy, \u201cCan Logic Programming Execute as Fast as Imperative Programming,\u201d Ph.D. thesis, Technical Report UCB\/CSD 90\/600, Univ. of California, Berkeley, 1990."},{"key":"262669_CR9","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/0004-3702(71)90010-5","volume":"2","author":"R. E. Fikes","year":"1971","unstructured":"R. E. Fikes, N. J. Nilsson, \u201cSTRIPS: A new approach to the application of theorem proving to problem solving,\u201d Artificial Intelligence, 2:189\u2013208, 1971.","journal-title":"Artificial Intelligence"},{"key":"262669_CR10","volume-title":"Practical Planning: Extending the Classical AI Planning Paradigm","author":"D. E. Wilkins","year":"1988","unstructured":"D. E. Wilkins, Practical Planning: Extending the Classical AI Planning Paradigm. Morgan Kaufmann, San Mateo, CA, 1988."},{"key":"262669_CR11","unstructured":"A. V. Aho, R. Sethi, J.D. Ullman, Compilers Principles, Techniques, and Tools. Addison Wesly, 1985."},{"key":"262669_CR12","unstructured":"AMD-K5 Technical Reference Manual, http:\/\/www.amd.com\/products\/cpg\/techdocs\/appnotes\/18524c.pdf."},{"key":"262669_CR13","unstructured":"Pentium Processor Overview, http:\/\/developer.intel.com\/design\/pentium\/."},{"key":"262669_CR14","unstructured":"I. J. Huang and T. C. Peng, \u201cAnalysis of x86 Instruction Set Usage for DOS\/Windows Applications and Its Implication on Superscalar Design,\u201d Proceedings of International Conference on Computer Design, 1998."},{"key":"262669_CR15","unstructured":"I. J. Huang and W. F. Gao, \u201cInstruction Retargeting Based on the State Pair Notation,\u201d Proc. of Asia and Pacific Conference on Hardware Description Languages, pp. 114\u2013120, Aug. 1997."},{"key":"262669_CR16","unstructured":"P. Marwedel and G. Goossens, Code Generation for Embedded Processors. Kluwer Academic Publisher, 1995."},{"key":"262669_CR17","unstructured":"P. Marwedel, \u201cTree-based Mapping of Algorithm to Predefined Structures,\u201d ICCAD, 1993."},{"key":"262669_CR18","unstructured":"RASM51E MCS-51 Cross Assembler, http:\/\/ftp.unina.it\/pub\/eletrocnics\/ftp.armory.com.8051\/RASM51E.TXT."},{"key":"262669_CR19","unstructured":"XASM Cross Assembler, http:\/\/www.nuri.net\/simtel.net\/msdos\/crossasm-pre.html\/xasm220.zip."},{"key":"262669_CR20","doi-asserted-by":"crossref","unstructured":"R. L. Sites et al., \u201cBinary Translation,\u201d Communication of the ACM, Feb. 1993.","DOI":"10.1145\/151220.151227"},{"key":"262669_CR21","unstructured":"W. E. George, A. Newell, \u201cSome issues of representation in a general problem solver,\u201d Sprint Joint Computer Conference 30, 1967."},{"key":"262669_CR22","unstructured":"C. Hunter, J. Banning, \u201cDOS at RISC,\u201d BYTE, Nov. 1989."},{"key":"262669_CR23","unstructured":"M. Johnson, Superscalar Microprocessor Design. Prentice Hall, 1991."},{"key":"262669_CR24","unstructured":"R. P. Nelson, Microsoft's 80386\/80486 Programming Guide. Microsoft Press, 1991."},{"key":"262669_CR25","doi-asserted-by":"crossref","unstructured":"A. Ghernoff et at., \u201cFX!32 A Profile-directed Binary Translator,\u201d IEEE Micro, pp. 56\u201364, March\/April 1998.","DOI":"10.1109\/40.671403"},{"key":"262669_CR26","doi-asserted-by":"crossref","unstructured":"C. Cifuentes, \u201cPartial Automation of Integrated Reverse Engineering Environment of Binary Code,\u201d Proceedings Third Working Conference on Reverse Engineering, pp. 50\u201356, IEEE-CS Press, Nov. 1996.","DOI":"10.1109\/WCRE.1996.558851"},{"key":"262669_CR27","doi-asserted-by":"crossref","unstructured":"C. Cifuentes, S. Sendall, \u201cSpecifying the Semantics of Machine Instructions,\u201d Proceedings of the International Workshop on Program Comprehension, pp. 126\u2013133, June 1998.","DOI":"10.1109\/WPC.1998.693332"},{"issue":"3","key":"262669_CR28","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1145\/256167.256225","volume":"19","author":"N. Ramsey","year":"1997","unstructured":"N. Ramsey, M. Fern\u00e1ndez, \u201cSpecifying Representations of Machine Instructions,\u201d ACM Transactions on Programming Languages and Systems, 19(3):492\u2013524, May 1997.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"262669_CR29","doi-asserted-by":"crossref","unstructured":"J. Loeckx, K Sieber, Chapter 3, The Foundations of Program Verification, 2nd ed. John Wiley & Sons, 1987.","DOI":"10.1007\/978-3-322-96753-4_1"},{"key":"262669_CR30","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/BF00121127","volume":"1","author":"J. Fernandez","year":"1992","unstructured":"J. Fernandez, et al., \u201cOn-the-fly Verification of Finite Transition Systems,\u201d Journal of Formal Methods in System Design, 1:251\u2013273, 1992.","journal-title":"Journal of Formal Methods in System Design"},{"key":"262669_CR31","doi-asserted-by":"crossref","unstructured":"R. Kurshan, Section 3.2, Computer-Aided Verification, Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3556-0"},{"key":"262669_CR32","doi-asserted-by":"crossref","unstructured":"C. Monahan, F. Brewer, \u201cSymbolic Modeling and Evaluation of Data Paths,\u201d Proc. ACM\/IEEE 32nd Design Automation Conference, June 1995.","DOI":"10.1145\/217474.217560"},{"key":"262669_CR33","unstructured":"S. Bashford and R. Leupers, \u201cPhase-Coupled Mapping of Data Flow Graphs to Irregular Data Paths,\u201d Journal of Design Automation for Embedded Systems."}],"container-title":["Design Automation for Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008926807523.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008926807523\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008926807523.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:25:41Z","timestamp":1752459941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008926807523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,6]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,6]]}},"alternative-id":["262669"],"URL":"https:\/\/doi.org\/10.1023\/a:1008926807523","relation":{},"ISSN":["0929-5585","1572-8080"],"issn-type":[{"type":"print","value":"0929-5585"},{"type":"electronic","value":"1572-8080"}],"subject":[],"published":{"date-parts":[[2000,6]]}}}