{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:16Z","timestamp":1750221016140,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T00:00:00Z","timestamp":1550102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,14]]},"DOI":"10.1145\/3299771.3299797","type":"proceedings-article","created":{"date-parts":[[2019,2,8]],"date-time":"2019-02-08T13:27:45Z","timestamp":1549632465000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Formal Verification of Optimizing Transformations during High-level Synthesis"],"prefix":"10.1145","author":[{"given":"Ramanuj","family":"Chouksey","sequence":"first","affiliation":[{"name":"Department of Computer Science &amp; Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chandan","family":"Karfa","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Purandar","family":"Bhaduri","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"8","article-title":"Verification of Code Motion Techniques Using Value Propagation","volume":"33","author":"Banerjee Kunal","year":"2014","unstructured":"Kunal Banerjee, Chandan Karfa, Dipankar Sarkar, and Chittaranjan A. Mandal. 2014. Verification of Code Motion Techniques Using Value Propagation. IEEE TCAD 33, 8 (Aug 2014), 1180--1193.","journal-title":"IEEE TCAD"},{"key":"e_1_3_2_1_2_1","unstructured":"Ramanuj Chouksey Chandan Karfa Kunal Banerjee Pankj Kalita and Purandar Bhaduri. forthcoming. A Counter-Example Generation Procedure for Path based Equivalence Checkers. IET Softeware (forthcoming)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ramanuj Chouksey Chandan Karfa and Purandar Bhaduri. 2017. Translation Validation of Loop Invariant Code Optimizations Involving False Computations. In VDAT. 767--778.","DOI":"10.1007\/978-981-10-7470-7_72"},{"key":"e_1_3_2_1_4_1","volume-title":"Translation Validation of Code Motion Transformations Involving Loops","author":"Chouksey Ramanuj","year":"2018","unstructured":"Ramanuj Chouksey, Chandan Karfa, and Purandar Bhaduri. 2018. Translation Validation of Code Motion Transformations Involving Loops. IEEE TCAD (2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"Ramanuj Chouksey Chandan Karfa and Purandar Bhaduri. forthcoming. Improving Performance of a Path-Based Equivalence Checker using Counter-Examples. In VLSID."},{"volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Clarke Edmund","key":"e_1_3_2_1_6_1","unstructured":"Edmund Clarke, Daniel Kroening, and Flavio Lerda. 2004. A Tool for Checking ANSI-C Programs. In Tools and Algorithms for the Construction and Analysis of Systems. Springer, Berlin, Heidelberg, 168--176."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_8_1","volume-title":"Assigning meanings to programs. Mathematical aspects of computer science 19, 1","author":"Floyd Robert W","year":"1967","unstructured":"Robert W Floyd. 1967. Assigning meanings to programs. Mathematical aspects of computer science 19, 1 (1967), 19--32."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/129337"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/832285.835535"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209291.2209303"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2007.913390"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/977402.978191"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"}],"event":{"name":"ISEC'19: 12th Innovations in Software Engineering Conference","sponsor":["iSOFT iSOFT","ACM Association for Computing Machinery","Microsoft Microsoft","ACM India ACM India"],"location":"Pune India","acronym":"ISEC'19"},"container-title":["Proceedings of the 12th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299771.3299797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299771.3299797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:13Z","timestamp":1750206373000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299771.3299797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,14]]},"references-count":14,"alternative-id":["10.1145\/3299771.3299797","10.1145\/3299771"],"URL":"https:\/\/doi.org\/10.1145\/3299771.3299797","relation":{},"subject":[],"published":{"date-parts":[[2019,2,14]]},"assertion":[{"value":"2019-02-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}