Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

thanks! I think the RISC/WMM folks provide an operational model too, using their own "I2E" formalism. The end of the paper seems to have a proof of equivalence between their axiomatic and operational models.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: