publication . Preprint . 2015

New Lace and Arsenic: adventures in weak memory with a program logic

Bornat, Richard; Alglave, Jade; Parkinson, Matthew;
Open Access English
  • Published: 04 Dec 2015
Abstract
Comment: This paper reports the joint work of its authors. But the words in the paper were written by Richard Bornat. Any opprobrium, bug reports, complaints, and observations about sins of com- mission or omission should be directed at him. R.Bornat@mdx.ac.uk
Subjects
free text keywords: Computer Science - Logic in Computer Science, F.3.1, D.2.4
Download from

Wait latch is vulnerable to weak-memory orderings, August 2007. URL http://www.postgresql. org/message-id/24241.1312739269@sss.pgh.pa.us.

Power ISA Version 2.06. IBM Corp., 2009.

Intel 64 and IA-32 Architectures Software Developer's Manual. Intel Corp., 2009.

C. A. R. Hoare. An axiomatic basis for computer programming. Commun. ACM, 12(10):576-580, 1969. ISSN 0001-0782. doi: http://doi.acm.org/10.1145/363235.363259. [OpenAIRE]

Abstract
Comment: This paper reports the joint work of its authors. But the words in the paper were written by Richard Bornat. Any opprobrium, bug reports, complaints, and observations about sins of com- mission or omission should be directed at him. R.Bornat@mdx.ac.uk
Subjects
free text keywords: Computer Science - Logic in Computer Science, F.3.1, D.2.4
Download from

Wait latch is vulnerable to weak-memory orderings, August 2007. URL http://www.postgresql. org/message-id/24241.1312739269@sss.pgh.pa.us.

Power ISA Version 2.06. IBM Corp., 2009.

Intel 64 and IA-32 Architectures Software Developer's Manual. Intel Corp., 2009.

C. A. R. Hoare. An axiomatic basis for computer programming. Commun. ACM, 12(10):576-580, 1969. ISSN 0001-0782. doi: http://doi.acm.org/10.1145/363235.363259. [OpenAIRE]

Any information missing or wrong?Report an Issue