|Efficient Implementation of Guarded Commands firstname.lastname@example.org (Peter H. Froehlich) (2002-04-16)|
|Re: Efficient Implementation of Guarded Commands email@example.com (Joachim Durchholz) (2002-04-17)|
|From:||"Peter H. Froehlich" <firstname.lastname@example.org>|
|Date:||16 Apr 2002 00:50:07 -0400|
|Posted-Date:||16 Apr 2002 00:50:06 EDT|
Does anyone know of papers, technical reports, books (?) that describe
the efficient implementation (read "compilation") of guarded commands?
I am interested mostly in their use in actual programming languages,
not specification languages. I know that the ESC project at SRC
transforms source language programs *into* a guarded command language
for their analysis, but I am lost as to what happens to those guarded
commands when they generate code.
Any help would be highly appreciated! As usual, I am willing to post a
summary of all information I receive to the list.
Peter H. Froehlich ->[!]<- http://nil.ics.uci.edu/~phf/
OpenPGP: D465 CBDD D9D2 0D77 C5AF 353E C86C 2AD9 A6E2 309E
Return to the
Search the comp.compilers archives again.