Results 41 to 50 of about 11,256 (247)
Dominant block guided optimal cache size estimation to maximize IPC of embedded software
Embedded system software is highly constrained from performance, memory footprint, energy consumption and implementing cost view point. It is always desirable to obtain better Instructions per Cycle.
Patel, Rajendra, Rajawat, Arvind
core +1 more source
Engineering a static verification tool for GPU kernels [PDF]
We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively ...
A.F. Donaldson +13 more
core +1 more source
ABSTRACT Plants have evolved highly efficient strategies to maintain iron (Fe) homeostasis. In this study, we investigate the impact of arbuscular mycorrhizal (AM) symbiosis on the Fe‐deficiency response and ionomic profile of tomato plants, as well as how Fe availability affects AM symbiosis.
Víctor M. López‐Lorca +3 more
wiley +1 more source
Metamorphic Code Generation from LLVM IR Bytecode [PDF]
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks +4 more
core +3 more sources
On-stack replacement, distilled [PDF]
On-stack replacement (OSR) is essential technology for adaptive optimization, allowing changes to code actively executing in a managed runtime. The engineering aspects of OSR are well-known among VM architects, with several implementations available to ...
Bhandari Abhilash +14 more
core +1 more source
DJ4Earth: Differentiable, and Performance‐Portable Earth System Modeling via Program Transformations
Abstract Differentiable Earth system models (ESMs) enable powerful applications such as sensitivity analysis, gradient‐based calibration, state estimation, boundary flux inversions, uncertainty quantification, and online machine learning. Reverse‐mode automatic differentiation (AD) efficiently provides gradients for such tasks, yet models have rarely ...
William S. Moses +19 more
wiley +1 more source
Scalable code clone detection tool based on semantic analysis
This article describes the methods of code clones detection. New approach of code clones detection is proposed for C/C++ languages based on analysis of existed methods.
Sevak Sargsyan +4 more
doaj +1 more source
Towards Vulnerability Discovery Using Staged Program Analysis
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean +6 more
core +1 more source
Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley +1 more source
Optimizing programs for given hardware architectures with static compilation: methods and tools
The paper describes the workflow for optimizing programs for performance targeting the fixed hardware architecture with static compilation using GCC and LLVM compilers as examples.
Dmitry Melnik +5 more
doaj +1 more source

