Tighter Loop Bound Analysis (Technical report)

نویسندگان

  • Pavel Cadek
  • Jan Strejcek
  • Marek Trtík
چکیده

We present a new algorithm for computing upper bounds on the number of executions of each program instruction during any single program run. The upper bounds are expressed as functions of program input values. The algorithm is primarily designed to produce bounds that are relatively tight, i.e. not unnecessarily blown up. The upper bounds for instructions allow us to infer loop bounds, i.e. upper bounds on the number of loop iterations. Experimental results show that the algorithm implemented in a prototype tool Looperman often produces tighter bounds than current tools for loop bound analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Molecular recognition of pyr mRNA by the Bacillus subtilis attenuation regulatory protein PyrR.

The pyrimidine nucleotide biosynthesis (pyr) operon in Bacillus subtilis is regulated by transcriptional attenuation. The PyrR protein binds in a uridine nucleotide-dependent manner to three attenuation sites at the 5'-end of pyr mRNA. PyrR binds an RNA-binding loop, allowing a terminator hairpin to form and repressing the downstream genes. The binding of PyrR to defined RNA molecules was chara...

متن کامل

A Tighter Analysis of Set Cover Greedy Algorithm for Test Set

Set cover greedy algorithm is a natural approximation algorithm for test set problem. This paper gives a precise and tighter analysis of approximation ratio of this algorithm. The author improves the approximation ratio 2 lnn directly derived from set cover to 1.14 lnn by applying potential function technique of derandomization method. In addition, the author gives a nontrivial lower bound (1+α...

متن کامل

Transformation of min-max optimization to least-square estimation and application to interconnect design optimization

abstract This paper describes a novel approach to nd a tighter bound of the transformation of the Min-Max problems into the one of Least-Square Estimation. It is well known that the above transformation of one problem to the other can lead to the proof that their target functions linearly bound each other. However, this linear bound is not a tight one. In this paper, we prove that if we transfo...

متن کامل

Featherweight Ownership and Immutability Generic Java - Technical Report Yoav

1 Introduction This technical report contains proofs that were omitted from our paper entitled " Ownership and Immutability in Generic Java ". Please read the paper first, and only then proceed to reading this technical report, because this technical report is not self contained. We only include a summary of the syntax (Fig. 1), subtyping rules (Fig. 2), expression typing rules (Fig. 3), and re...

متن کامل

Exponential Memory-Bound Functions for Proof of Work Protocols Technical Report A/370/CRI

In year 2005, Internet users are twice more likely to receive unsolicited electronic messages, known as spams, than regular emails. Proof of work protocols are designed to limit such phenomena and other denial-of-service attacks by requiring some kind of virtual stamping. These schemes require computing an easy to verify but hard to find solution to some problem. As cpu-intensive computations a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1605.03636  شماره 

صفحات  -

تاریخ انتشار 2016