Остановите войну!
for scientists:
default search action
Steven W. K. Tjiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1993
- [b1]Steven W. K. Tjiang:
Automatic generation of data-flow analyzers : a tool for building optimizers. Stanford University, USA, 1993
Journal Articles
- 1999
- [j8]Ashok Sudarsanam, Sharad Malik, Steven W. K. Tjiang, Stan Y. Liao:
Paged Absolute Addressing Mode Optimizations for Embedded Digital Signal Processors Using Post-pass Data-flow Analysis. Des. Autom. Embed. Syst. 4(1): 41-59 (1999) - 1998
- [j7]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Code Optimization Techniques in Embedded DSP Microprocessors. Des. Autom. Embed. Syst. 3(1): 59-73 (1998) - [j6]Taewhan Kim, William Jao, Steven W. K. Tjiang:
Circuit optimization using carry-save-adder cells. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 17(10): 974-984 (1998) - [j5]Stan Y. Liao, Kurt Keutzer, Steven W. K. Tjiang, Srinivas Devadas:
A new viewpoint on code generation for directed acyclic graphs. ACM Trans. Design Autom. Electr. Syst. 3(1): 51-75 (1998) - 1997
- [j4]Vojin Zivojnovic, Steven W. K. Tjiang, Heinrich Meyr:
Compiled Simulation of Programmable DSP Architectures. J. VLSI Signal Process. 16(1): 73-80 (1997) - 1996
- [j3]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Storage Assignment to Decrease Code Size. ACM Trans. Program. Lang. Syst. 18(3): 235-253 (1996) - 1994
- [j2]Robert P. Wilson, Robert S. French, Christopher S. Wilson, Saman P. Amarasinghe, Jennifer-Ann M. Anderson, Steven W. K. Tjiang, Shih-Wei Liao, Chau-Wen Tseng, Mary W. Hall, Monica S. Lam, John L. Hennessy:
SUIF: An Infrastructure for Research on Parallelizing and Optimizing Compilers. ACM SIGPLAN Notices 29(12): 31-37 (1994) - 1989
- [j1]Alfred V. Aho, Mahadevan Ganapathi, Steven W. K. Tjiang:
Code Generation Using Tree Matching and Dynamic Programming. ACM Trans. Program. Lang. Syst. 11(4): 491-516 (1989)
Conference and Workshop Papers
- 1998
- [c10]Taewhan Kim, William Jao, Steven W. K. Tjiang:
Arithmetic Optimization Using Carry-Save-Adders. DAC 1998: 433-438 - 1997
- [c9]Stan Y. Liao, Steven W. K. Tjiang, Rajesh K. Gupta:
An Efficient Implementation of Reactivity for Modeling Hardware in the Scenic Design Environment. DAC 1997: 70-75 - [c8]Ashok Sudarsanam, Sharad Malik, Steven W. K. Tjiang, Stan Y. Liao:
Optimization of embedded DSP programs using post-pass data-flow analysis. ICASSP 1997: 695-698 - 1995
- [c7]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Code Optimization Techniques for Embedded DSP Microprocessors. DAC 1995: 599-604 - [c6]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang:
Instruction selection using binate covering for code size optimization. ICCAD 1995: 393-399 - [c5]Richard Gerber, Steven W. K. Tjiang, David B. Whalley, David N. Wilner, Michael Wolfe:
Appropriate Interfaces Between Design Tools, Languages, Compilers and Runtimes in Real-Time Systems (Panel). Workshop on Languages, Compilers, & Tools for Real-Time Systems 1995: 124 - [c4]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Storage Assignment to Decrease Code Size. PLDI 1995: 186-195 - 1994
- [c3]Guido Araujo, Srinivas Devadas, Kurt Keutzer, Stan Y. Liao, Sharad Malik, Ashok Sudarsanam, Steven W. K. Tjiang, Albert R. Wang:
Challenges in code generation for embedded processors. Code Generation for Embedded Processors 1994: 48-64 - 1992
- [c2]Steven W. K. Tjiang, John L. Hennessy:
Sharlit - A Tool for Building Optimizers. PLDI 1992: 82-93 - 1991
- [c1]Steven W. K. Tjiang, Michael E. Wolf, Monica S. Lam, K. Pieper, John L. Hennessy:
Integrating Scalar Optimization and Parallelization. LCPC 1991: 137-151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-23 23:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint