Results 81 to 90 of about 10,356 (199)
Towards Energy Consumption Verification via Static Analysis
In this paper we leverage an existing general framework for resource usage verification and specialize it for verifying energy consumption specifications of embedded programs.
Haemmerle, Remy +4 more
core
A taxonomy of automatic differentiation pitfalls
Automatic differentiation is a popular technique for computing derivatives of computer programs in countless engineering, science and machine learning applications. In this paper we categorize problematic usages of automatic differentiation that can lead to surprising results, and illustrate each category with examples such as chaos, time‐averages ...
Jan Hückelheim +5 more
wiley +1 more source
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin +5 more
doaj +1 more source
Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks
Predicting the number of clock cycles a processor takes to execute a block of assembly instructions in steady state (the throughput) is important for both compiler designers and performance engineers.
Amarasinghe, Saman +3 more
core
Метою роботи є пошук неоптимального машинного коду, який генерується iнфраструктурою LLVM для мов програмування, якi її використовують та подальша оптимiзацiя. Результатом роботи стала реалiзацiя проходу, який знаходить патерн перевiрки двох цiлих знакових чисел на одинаковий знак наївним методом та перетворює вiдповiдний IR на оптимальнiший ...
openaire +1 more source
Survey of research on confidential computing
This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the ...
Dengguo Feng +5 more
wiley +1 more source
This paper analyzes approaches for optimizing C/C++ applications used in twostage compilation system, allowing distributing such applications in the LLVM (low level virtual machine) intermediate representation.
Sh. F. Kurmangaleev
doaj
Copy-paste semantic errors detection
The paper describes a method for semantic errors detection arising during incorrect code copy-paste made by the developer. The method consists of two basic parts. The first part detects code clones based on lexical analysis of the program.
Sevak Sargsyan
doaj +1 more source
Protecting Private Data in the Cloud [PDF]
Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company.
Aslam, Mudassar, Rasmusson, Lars
core +1 more source
We present libVersioningCompiler, a C++ library designed to support the dynamic generation of multiple versions of the same compute kernel in a HPC scenario.
S. Cherubin, G. Agosta
doaj +1 more source

