default search action
Steven W. K. Tjiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1999
- [j8]Ashok Sudarsanam, Sharad Malik, Steven W. K. Tjiang, Stan Y. Liao:
Paged Absolute Addressing Mode Optimizations for Embedded Digital Signal Processors Using Post-pass Data-flow Analysis. Des. Autom. Embed. Syst. 4(1): 41-59 (1999) - 1998
- [j7]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Code Optimization Techniques in Embedded DSP Microprocessors. Des. Autom. Embed. Syst. 3(1): 59-73 (1998) - [j6]Taewhan Kim, William Jao, Steven W. K. Tjiang:
Circuit optimization using carry-save-adder cells. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 17(10): 974-984 (1998) - [j5]Stan Y. Liao, Kurt Keutzer, Steven W. K. Tjiang, Srinivas Devadas:
A new viewpoint on code generation for directed acyclic graphs. ACM Trans. Design Autom. Electr. Syst. 3(1): 51-75 (1998) - [c10]Taewhan Kim, William Jao, Steven W. K. Tjiang:
Arithmetic Optimization Using Carry-Save-Adders. DAC 1998: 433-438 - 1997
- [j4]Vojin Zivojnovic, Steven W. K. Tjiang, Heinrich Meyr:
Compiled Simulation of Programmable DSP Architectures. J. VLSI Signal Process. 16(1): 73-80 (1997) - [c9]Stan Y. Liao, Steven W. K. Tjiang, Rajesh K. Gupta:
An Efficient Implementation of Reactivity for Modeling Hardware in the Scenic Design Environment. DAC 1997: 70-75 - [c8]Ashok Sudarsanam, Sharad Malik, Steven W. K. Tjiang, Stan Y. Liao:
Optimization of embedded DSP programs using post-pass data-flow analysis. ICASSP 1997: 695-698 - 1996
- [j3]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Storage Assignment to Decrease Code Size. ACM Trans. Program. Lang. Syst. 18(3): 235-253 (1996) - 1995
- [c7]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Code Optimization Techniques for Embedded DSP Microprocessors. DAC 1995: 599-604 - [c6]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang:
Instruction selection using binate covering for code size optimization. ICCAD 1995: 393-399 - [c5]Richard Gerber, Steven W. K. Tjiang, David B. Whalley, David N. Wilner, Michael Wolfe:
Appropriate Interfaces Between Design Tools, Languages, Compilers and Runtimes in Real-Time Systems (Panel). Workshop on Languages, Compilers, & Tools for Real-Time Systems 1995: 124 - [c4]Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang, Albert R. Wang:
Storage Assignment to Decrease Code Size. PLDI 1995: 186-195 - 1994
- [j2]Robert P. Wilson, Robert S. French, Christopher S. Wilson, Saman P. Amarasinghe, Jennifer-Ann M. Anderson, Steven W. K. Tjiang, Shih-Wei Liao, Chau-Wen Tseng, Mary W. Hall, Monica S. Lam, John L. Hennessy:
SUIF: An Infrastructure for Research on Parallelizing and Optimizing Compilers. ACM SIGPLAN Notices 29(12): 31-37 (1994) - [c3]Guido Araujo, Srinivas Devadas, Kurt Keutzer, Stan Y. Liao, Sharad Malik, Ashok Sudarsanam, Steven W. K. Tjiang, Albert R. Wang:
Challenges in code generation for embedded processors. Code Generation for Embedded Processors 1994: 48-64 - 1993
- [b1]Steven W. K. Tjiang:
Automatic generation of data-flow analyzers : a tool for building optimizers. Stanford University, USA, 1993 - 1992
- [c2]Steven W. K. Tjiang, John L. Hennessy:
Sharlit - A Tool for Building Optimizers. PLDI 1992: 82-93 - 1991
- [c1]Steven W. K. Tjiang, Michael E. Wolf, Monica S. Lam, K. Pieper, John L. Hennessy:
Integrating Scalar Optimization and Parallelization. LCPC 1991: 137-151
1980 – 1989
- 1989
- [j1]Alfred V. Aho, Mahadevan Ganapathi, Steven W. K. Tjiang:
Code Generation Using Tree Matching and Dynamic Programming. ACM Trans. Program. Lang. Syst. 11(4): 491-516 (1989)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-16 23:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint