Java Optimization for Superscalar and Vector Architectures.
نویسندگان
چکیده
منابع مشابه
Java Optimization for Superscalar and Vector Architectures
This paper describes the refactoring of Java code to take advantage of the superscalar and vector architectures available on many modern desktop computers. The unrolling of Java loops is shown to cause some speed-ups for Java code. However, our benchmarks reveal that Java still lags behind vectorized C code. The present state-of-the-art in computer hardware has outpaced the current state of the...
متن کاملLoop Splitting for Superscalar Architectures
Program transformations and algorithm modiications are discussed that reduce execution time for iterative methods for solving partial diierential equations on high-performance computers. Techniques typically associated with parallel computers turn out to be essential to obtain optimal performance on current superscalar uniprocessors. The tested programs were written in Fortran77 and run on a si...
متن کاملReal-Time Software Synthesis on Superscalar Architectures
Advances in processor technology will make it possible to use general-purpose personal computers as real-time signal processors. This will enable highly-integrated ‘‘all-software’’ systems for music processing. To this end, the performance of a present generation superscalar processor running synthesis software is measured and analyzed. A real-time reimplementation of Fugue, now called Nyquist,...
متن کاملDesigning High-Performance & Reliable Superscalar Architectures
As VLSI geometry continues to shrink and the level of integration increases, it is expected that the probability of faults, particularly transient faults, will increase in future microprocessors. So far, fault tolerance has chiefly been considered for special purpose or safety critical systems, but future technology will likely require integrating fault tolerance techniques into commercial syst...
متن کاملExtensible Security Architectures for Java
Mobile code technologies such as Java, JavaScript, and ActiveX generally limit all programs to a single restrictive security policy. However, software-based protection can allow for more extensible security models, with potentially signi cant performance improvements over traditional hardware-based solutions. An extensible security system should be able to protect subsystems and implement polic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Object Technology
سال: 2005
ISSN: 1660-1769
DOI: 10.5381/jot.2005.4.2.c3