Lazy Set-Sharing Analysis
نویسندگان
چکیده
Sharing analysis is widely deployed in the optimisation, specialisation and parallelisation of logic programs. Each abstract unification operation over the classic Jacobs and Langen domain involves the calculation of a closure operation that has exponential worst-case complexity. This paper explores a new tactic for improving performance: laziness. The idea is to compute partial sharing information eagerly and recover full sharing information lazily. The net result is an analysis that runs in a fraction of the time of the classic analysis and yet has comparable precision.
منابع مشابه
Digital Secret Sharing using XOR based region incrementing and lazy wavelet in video
Secret sharing is the process of distributing a secret amongst a group of participants each of whom is allocated a share of the secret. This secret can be reconstructed only when a enough number of possibly different types of shares are combined together. Individual shares have no use here Steganography can applied on video files and hide the message in an encrypted format thus achieving a mult...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملUnification with Lazy Non-Redundant Copying
This paper presents a unification procedure which eliminates the redundant copying of structures by using a lazy incremental copying appr0a~:h to achieve structure sharing. Copying of structures accounts for a considerable amount of the total processing time. Several methods have been proposed to minimize the amount of necessary copying. Lazy Incremental Copying (LIC) is presented as a new solu...
متن کاملUnderstanding and Improving Bloom Filter Configuration for Lazy Address-Set Disambiguation
Understanding and Improving Bloom Filter Configuration for Lazy Address-Set Disambiguation Mark C. Jeffrey Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2011 Many parallelization systems detect memory access conflicts across concurrent threads by disambiguating address-sets using bit-vector-based Bloom filters, which are efficient, bu...
متن کاملView-Based Consistency and Its Implementation
This paper proposes a novel View-based Consistency model for Distributed Shared Memory. A view is a set of ordinary data objects that a processor has the right to access in a data-race-free program. The View-based Consistency model only requires that the data objects of a view are updated before a processor accesses them. Compared with other memory consistency models, the View-based Consistency...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006