Results 81 to 90 of about 10,356 (199)

Towards Energy Consumption Verification via Static Analysis

open access: yes, 2015
In this paper we leverage an existing general framework for resource usage verification and specialize it for verifying energy consumption specifications of embedded programs.
Haemmerle, Remy   +4 more
core  

A taxonomy of automatic differentiation pitfalls

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 14, Issue 6, November/December 2024.
Automatic differentiation is a popular technique for computing derivatives of computer programs in countless engineering, science and machine learning applications. In this paper we categorize problematic usages of automatic differentiation that can lead to surprising results, and illustrate each category with examples such as chaos, time‐averages ...
Jan Hückelheim   +5 more
wiley   +1 more source

Dynamic analysis of virtualization- and dispatching-obfuscated applications

open access: yesТруды Института системного программирования РАН, 2018
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin   +5 more
doaj   +1 more source

Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks

open access: yes, 2019
Predicting the number of clock cycles a processor takes to execute a block of assembly instructions in steady state (the throughput) is important for both compiler designers and performance engineers.
Amarasinghe, Saman   +3 more
core  

Оптимізація LLVM IR

open access: yes, 2022
Метою роботи є пошук неоптимального машинного коду, який генерується iнфраструктурою LLVM для мов програмування, якi її використовують та подальша оптимiзацiя. Результатом роботи стала реалiзацiя проходу, який знаходить патерн перевiрки двох цiлих знакових чисел на одинаковий знак наївним методом та перетворює вiдповiдний IR на оптимальнiший ...
openaire   +1 more source

Survey of research on confidential computing

open access: yesIET Communications, Volume 18, Issue 9, Page 535-556, June 2024.
This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the ...
Dengguo Feng   +5 more
wiley   +1 more source

Machine-specific optimization methods for C/C++ applications that are distributed in the LLVM intermediate representation format

open access: yesТруды Института системного программирования РАН, 2018
This paper analyzes approaches for optimizing C/C++ applications used in twostage compilation system, allowing distributing such applications in the LLVM (low level virtual machine) intermediate representation.
Sh. F. Kurmangaleev
doaj  

Copy-paste semantic errors detection

open access: yesТруды Института системного программирования РАН, 2018
The paper describes a method for semantic errors detection arising during incorrect code copy-paste made by the developer. The method consists of two basic parts. The first part detects code clones based on lexical analysis of the program.
Sevak Sargsyan
doaj   +1 more source

Protecting Private Data in the Cloud [PDF]

open access: yes, 2012
Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company.
Aslam, Mudassar, Rasmusson, Lars
core   +1 more source

libVersioningCompiler: An easy-to-use library for dynamic generation and invocation of multiple code versions

open access: yesSoftwareX, 2018
We present libVersioningCompiler, a C++ library designed to support the dynamic generation of multiple versions of the same compute kernel in a HPC scenario.
S. Cherubin, G. Agosta
doaj   +1 more source

Home - About - Disclaimer - Privacy