Results 11 to 20 of about 10,356 (199)

Automatic Vectorization Transplant and Optimization of LLVM for Domestic Processors [PDF]

open access: yesJisuanji gongcheng, 2022
Automatic vectorization is essential in SIMD extension vectorization, and has been implemented in the LLVM compiler.However, the difference of vector length and instruction set functions can cause the domestic processors to lose the opportunity of ...
LI Jia'nan, HAN Lin, CHAI Yunda
doaj   +1 more source

Termination-checking for LLVM peephole optimizations [PDF]

open access: yesProceedings of the 38th International Conference on Software Engineering, 2016
Mainstream compilers contain a large number of peephole optimizations, which perform algebraic simplification of the input program with local rewriting of the code. These optimizations are a persistent source of bugs. Our recent research on Alive, a domainspecific language for expressing peephole optimizations in LLVM, addresses a part of the problem ...
Nagarakatte, Santosh, Menendez, David
openaire   +1 more source

Description of the approach to development of the obfuscating compiler

open access: yesТруды Института системного программирования РАН, 2018
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev   +2 more
doaj   +1 more source

Lost in translation: Exposing hidden compiler optimization opportunities [PDF]

open access: yes, 2020
Existing iterative compilation and machine-learning-based optimization techniques have been proven very successful in achieving better optimizations than the standard optimization levels of a compiler.
Chamski, Zbigniew   +4 more
core   +3 more sources

Output-sensitive Information flow analysis [PDF]

open access: yesLogical Methods in Computer Science, 2021
Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more ...
Cristian Ene   +2 more
doaj   +1 more source

Applying two-stage LLVM-based compilation approach to application deployment via cloud storage

open access: yesТруды Института системного программирования РАН, 2018
The paper describes two-stage compilation approach for C/C++ languages that allows deploying application in the LLVM intermediate representation. The LLVM modifications for optimizing code generation time are presented as well as the developed profile ...
Sergey Gaissaryan   +4 more
doaj   +1 more source

Static analysis of energy consumption for LLVM IR programs [PDF]

open access: yes, 2015
Energy models can be constructed by characterizing the energy consumed by executing each instruction in a processor's instruction set. This can be used to determine how much energy is required to execute a sequence of assembly instructions, without the ...
Eder, Kerstin   +5 more
core   +3 more sources

Enhancing R with Advanced Compilation Tools and Methods [PDF]

open access: yes, 2014
I describe an approach to compiling common idioms in R code directly to native machine code and illustrate it with several examples. Not only can this yield significant performance gains, but it allows us to use new approaches to computing in R ...
Lang, Duncan Temple
core   +1 more source

Genetic Improvement of LLVM Intermediate Representation

open access: yes, 2023
Evolving LLVM IR is widely applicable, with LLVM Clang offering support for an increasing range of computer hardware and programming languages. Local search mutations are used to hill climb industry C code released to support geographic open standards: Open Location Code (OLC) from Google and Uber's Hexagonal Hierarchical Spatial Index (H3), giving up ...
Langdon, William   +3 more
openaire   +1 more source

Automatic C Program Verification Based on Mixed Axiomatic Semantics

open access: yesМоделирование и анализ информационных систем, 2013
The development of the C-light project resulted in the application of new formalisms and implementation techniques which facilitate the verification process.
I. V. Maryasov   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy