Information Technology Reference
In-Depth Information
6. R. M. Cohen, The Defensive Java Virtual Machine Specication, Version 0.53 ,
Electronic Data Systems, Corp, Austin Technical Services Center, 98 San
Jacinto Blvd, Suite 500, Austin, TX 78701 (email: cohen@aus.edsr.eds.com).
7. A. D. Flatau, A veried implementation of an applicative language with dy-
namic storage allocation , PhD Thesis, University of Texas at Austin, 1992.
8. M. Kaufmann and J Strother Moore \An Industrial Strength Theorem Prover
for a Logic Based on Common Lisp," IEEE Transactions on Software Engi-
neering , 23 (4), pp. 203{213, April, 1997
9. M. Kaufmann and J Strother Moore \A Precise Description of
the ACL2 Logic," http://www.cs.utexas.edu/users/moore/publications/-
km97a.ps.Z, April, 1998.
10. T. Lindholm and F. Yellin The Java Virtual Machine Specication , Addison-
Wesley, 1996.
11. J S. Moore. Piton: A Mechanically Veried Assembly-Level Language .Auto-
mated Reasoning Series, Kluwer Academic Publishers, 1996.
12. G. L. Steele, Jr. Common Lisp The Language, Second Edition . Digital Press,
30 North Avenue, Burlington, MA 01803, 1990.
13. W. D. Young, A Veried Code-Generator for a Subset of Gypsy , PhD Thesis,
University of Texas at Austin" 1988.
14. Y. Yu. Automated Proofs of Object Code For a Widely Used Microproces-
sor . PhD thesis, University of Texas at Austin, 1992. Lecture Notes in
Computer Science, Springer-Verlag (to appear). ftp://ftp.cs.utexas.edu/pub-
/techreports/tr93-09.ps.Z.
Search WWH ::




Custom Search