Verification of programs that destructively manipulate data
- 30 April 1988
- journal article
- research article
- Published by Elsevier in Science of Computer Programming
- Vol. 10 (2) , 177-210
- https://doi.org/10.1016/0167-6423(88)90026-3
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Program derivation through transformations: The evolution of list-copying algorithmsScience of Computer Programming, 1986
- Varieties of ”If-Then-Else“SIAM Journal on Computing, 1983
- Analysis of pointer “rotation”Communications of the ACM, 1982
- The Schorr-Waite marking algorithm revisitedInformation Processing Letters, 1980
- The Schorr-Waite graph marking algorithmActa Informatica, 1979
- The correctness of the Schorr-Waite list marking algorithmActa Informatica, 1979
- Is “sometime” sometimes better than “always”?Communications of the ACM, 1978
- A Transformation System for Developing Recursive ProgramsJournal of the ACM, 1977
- An efficient machine-independent procedure for garbage collection in various list structuresCommunications of the ACM, 1967
- Assigning meanings to programsPublished by American Mathematical Society (AMS) ,1967