نتایج جستجو برای: run time leakage

تعداد نتایج: 1977427  

Journal: :Journal of Object Technology 2002
Michael Compton Richard Walker

ing locking in terms of fast and slow methods of lock acquisition, where the slow method requires communication between threads on wait queues, is similar to the approach described by Agesen [1]. The list built by the unlocking processor is called the HANDOFF-list and the process of signalling each processor in turn is called the HANDOFF-protocol. Each processor woken during the HANDOFF-protoco...

2011
Michael Philippsen Nikolai Tillmann Daniel Brinkers

The Inspector/Executor is well-known for parallelizing loops with irregular access patterns that cannot be analyzed statically. The downsides of existing inspectors are that it is hard to amortize their high run-time overheads by actually executing the loop in parallel, that they can only be applied to loops with dependencies that do not change during their execution and that they are often spe...

Journal: :J. Funct. Program. 2006
Stephanie Weirich

Polytypic programming is a way of defining type-indexed operations, such as map, fold and zip, based on type information. Run-time polytypic programming allows that type information to be dynamically computed—this support is essential in modern programming languages that support separate compilation, first-class type abstraction, or polymorphic recursion. However, in previous work we defined ru...

1990
C. J. Fidge

A “concurrency measure” provides an objective means of comparing the level of parallelism achievable by a distributed computation. To date such measures have only been applicable after a computation has successfully terminated. This paper develops a notion of “observed concurrency” that can be continuously evaluated as a computation proceeds. It is suitable for nested parallelism and evaluation...

2004
Bernd Brassel Michael Hanus Frank Huch Josep Silva Germán Vidal

In this work, we introduce a profiling scheme for modern functional logic languages covering notions like laziness, sharing, and non-determinism. Firstly, we instrument a natural (big-step) semantics in order to associate a symbolic cost to each basic operation (e.g., variable updates, function unfoldings, case evaluations). While this cost semantics provides a formal basis to analyze the cost ...

2000
Michael Eisenring Marco Platzner

Run-time reconfigurable approaches for FPGAs are gaining interest as they enlarge the design space for system implementation by sequential execution of temporally exclusive system parts on one or several FPGA resources. In [7], we introduced a novel methodology and a design tool for communication synthesis in reconfigurable embedded systems. In [5], this work was extended by a hierarchical reco...

Journal: :Comput. J. 2011
Andreas Bauer Jan Jürjens Yijun Yu

(2011). Run-time security traceability for evolving systems. Security-critical systems are challenging to design and implement correctly and securely. A lot of vulnerabilities have been found in current software systems both at the specification and the implementation levels. This paper presents a comprehensive approach for model-based security assurance. Initially, it allows one to formally ve...

1995
V. Prasad Krothapalli Thulasiraman Jeyaraman Mark Giesbrecht

Dependencies between iterations of loop structures cannot always be determined at compile-time because they may depend on input data which is known only at run-time. A prime example is a loop accessing an array where the array indices are themselves functions of another array determined only at run-time. To parallelize such loops, it is necessary to perform a run-time analysis. We describe a ne...

2006
José Mocito Luís E. T. Rodrigues

A total order protocol is a fundamental building block in the construction of many distributed fault-tolerant applications. Unfortunately, the implementation of such a primitive can be expensive both in terms of communication steps and of number of messages exchanged. This problem is exacerbated in large-scale systems, where the performance of the algorithm may be limited by the presence of hig...

2008

Contention over shared resources is one of many variables affecting parallel performance on modern multi-core processors. The issue is of particular interest because it the primary factor limiting fully independent threads/processes which would otherwise showcase linear speedup with each additional core. Furthermore, addressing the problem is a non-trivial task. Shared-resource contention, whil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید