Skip to main content
Logo image

References Literature

[2]
  
Xi Wang and Haogang Chen and Alvin Cheung and Zhihao Jia and Nickolai Zeldovich and M. Frans Kaashoek, Undefined Behavior: What happened to my code?, Asia-Pacific Workshop on Systems, APSys '12, Seoul, Republic of Korea, July 23-24, 2012 (2012) http://doi.acm.org/10.1145/2349896.2349905 10.1145/2349896.2349905
[4]
  
Thomas H. Cormen and Charles E. Leiserson and Ronald L. Rivest and Clifford Stein, Introduction to Algorithms, MIT Press; (2009)
[7]
  
Glynn Winskel, The Formal Semantics of Programming Languages: An Introduction, (1993) MIT Press;
[13]
  
Mauro Pezzè and Michal Young, Software Testing and Analysis: Process, Principles and Techniques, Wiley; (2007)
[15]
  
Stefan Richter and Victor Alvarez and Jens Dittrich, A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing, (2015) Proceedings of the VLDB Endowment 9 no. 3, 96-107. http://www.vldb.org/pvldb/vol9/p96-richter.pdf
[16]
  
Reinhard Wilhelm and Helmut Seidl and Sebastian Hack, Compiler Design - Syntactic and Semantic Analysis, (2013) Springer; 10.1007/978-3-642-17540-4
[17]
  
Ravi Sethi and Jeffrey Ullman, The Generation of Optimal Code for Arithmetic Expressions, (1970) Journal of the ACM 17 no. 4, 715-728. ACM; 10.1145/321607.321620