Tighter Loop Bound Analysis (Technical report)
نویسندگان
چکیده
We present a new algorithm for computing upper bounds on the number of executions of each program instruction during any single program run. The upper bounds are expressed as functions of program input values. The algorithm is primarily designed to produce bounds that are relatively tight, i.e. not unnecessarily blown up. The upper bounds for instructions allow us to infer loop bounds, i.e. upper bounds on the number of loop iterations. Experimental results show that the algorithm implemented in a prototype tool Looperman often produces tighter bounds than current tools for loop bound analysis.
منابع مشابه
Molecular recognition of pyr mRNA by the Bacillus subtilis attenuation regulatory protein PyrR.
The pyrimidine nucleotide biosynthesis (pyr) operon in Bacillus subtilis is regulated by transcriptional attenuation. The PyrR protein binds in a uridine nucleotide-dependent manner to three attenuation sites at the 5'-end of pyr mRNA. PyrR binds an RNA-binding loop, allowing a terminator hairpin to form and repressing the downstream genes. The binding of PyrR to defined RNA molecules was chara...
متن کاملA Tighter Analysis of Set Cover Greedy Algorithm for Test Set
Set cover greedy algorithm is a natural approximation algorithm for test set problem. This paper gives a precise and tighter analysis of approximation ratio of this algorithm. The author improves the approximation ratio 2 lnn directly derived from set cover to 1.14 lnn by applying potential function technique of derandomization method. In addition, the author gives a nontrivial lower bound (1+α...
متن کاملTransformation of min-max optimization to least-square estimation and application to interconnect design optimization
abstract This paper describes a novel approach to nd a tighter bound of the transformation of the Min-Max problems into the one of Least-Square Estimation. It is well known that the above transformation of one problem to the other can lead to the proof that their target functions linearly bound each other. However, this linear bound is not a tight one. In this paper, we prove that if we transfo...
متن کاملFeatherweight Ownership and Immutability Generic Java - Technical Report Yoav
1 Introduction This technical report contains proofs that were omitted from our paper entitled " Ownership and Immutability in Generic Java ". Please read the paper first, and only then proceed to reading this technical report, because this technical report is not self contained. We only include a summary of the syntax (Fig. 1), subtyping rules (Fig. 2), expression typing rules (Fig. 3), and re...
متن کاملExponential Memory-Bound Functions for Proof of Work Protocols Technical Report A/370/CRI
In year 2005, Internet users are twice more likely to receive unsolicited electronic messages, known as spams, than regular emails. Proof of work protocols are designed to limit such phenomena and other denial-of-service attacks by requiring some kind of virtual stamping. These schemes require computing an easy to verify but hard to find solution to some problem. As cpu-intensive computations a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1605.03636 شماره
صفحات -
تاریخ انتشار 2016