default search action
CGO 2013: Shenzhen, China
- Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, CGO 2013, Shenzhen, China, February 23-27, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5524-7
- Yulei Sui, Yue Li, Jingling Xue:
Query-directed adaptive heap cloning for optimizing compilers. 1:1-1:11 - Li Tan, Min Feng, Rajiv Gupta:
Lightweight fault detection in parallelized programs. 2:1-2:11 - Cheng Wang, Youfeng Wu, Marcelo Cintra:
Acceldroid: Co-designed acceleration of Android bytecode. 3:1-3:10 - Junjie Lai, André Seznec:
Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs. 4:1-4:10 - Feng Li, Wei Huo, Congming Chen, Lujie Zhong, Xiaobing Feng, Zhiyuan Li:
Effective fault localization based on minimum debugging frontier set. 5:1-5:10 - Hyoun Kyu Cho, Terence Kelly, Yin Wang, Stéphane Lafortune, Hongwei Liao, Scott A. Mahlke:
Practical lock/unlock pairing for concurrent programs. 6:1-6:12 - Yongpeng Zhang, Frank Mueller:
Hidp: A hierarchical data parallel language. 7:1-7:11 - Wenjia Ruan, Yujie Liu, Chao Wang, Michael F. Spear:
On the platform specificity of STM instrumentation mechanisms. 8:1-8:10 - Sameer Kulkarni, John Cavazos, Christian Wimmer, Doug Simon:
Automatic construction of inlining heuristics using machine learning. 9:1-9:12 - Boubacar Diouf, Albert Cohen, Fabrice Rastello:
A polynomial spilling heuristic: Layered allocation. 10:1-10:10 - Jacques A. Pienaar, Robert Hundt:
JSWhiz: Static analysis for JavaScript memory leaks. 11:1-11:11 - Wei Ding, Yuanrui Zhang, Mahmut T. Kandemir, Jithendra Srinivas, Praveen Yedlapalli:
Locality-aware mapping and scheduling for multicores. 12:1-12:12 - Murali Krishna Emani, Zheng Wang, Michael F. P. O'Boyle:
Smart, adaptive mapping of parallelism in the presence of external workload. 13:1-13:10 - Ian Gartley, Marius Pirvu, Vijay Sundaresan, Nikola Grcevski:
Experiences in designing a robust and scalable interpreter profiling framework. 14:1-14:10 - Hyoun Kyu Cho, Tipp Moseley, Richard E. Hank, Derek Bruening, Scott A. Mahlke:
Instant profiling: Instrumentation sampling for profiling datacenter applications. 15:1-15:10 - Ramshankar Chouhan, Subhajit Roy, Surender Baswana:
Pertinent path profiling: Tracking interactions among relevant statements. 16:1-16:12 - Mingzhou Zhou, Bo Wu, Yufei Ding, Xipeng Shen:
Profmig: A framework for flexible migration of program profiles across software versions. 17:1-17:12 - Donghwan Jeon, Saturnino Garcia, Michael Bedford Taylor:
Skadu: Efficient vector shadow memories for poly-scopic program analysis. 18:1-18:12 - David Eklov, Nikos Nikoleris, David Black-Schaffer, Erik Hagersten:
Bandwidth Bandit: Quantitative characterization of memory contention. 19:1-19:10 - Bin Ren, Gagan Agrawal, James R. Larus, Todd Mytkowicz, Tomi Poutanen, Wolfram Schulte:
SIMD parallelization of applications that traverse irregular data structures. 20:1-20:10 - Jie Yan, Guangming Tan, Xiuxia Zhang, Erlin Yao, Ninghui Sun:
Vlock: Lock virtualization mechanism for exploiting fine-grained parallelism in graph traversal algorithms. 21:1-21:10 - Dominik Grewe, Zheng Wang, Michael F. P. O'Boyle:
Portable mapping of data parallel programs to OpenCL for heterogeneous systems. 22:1-22:10 - Andrei Homescu, Steven Neisius, Per Larsen, Stefan Brunthaler, Michael Franz:
Profile-guided automated software diversity. 23:1-23:11 - William Arthur, Biruk Mammo, Ricardo Rodríguez Jorge, Todd M. Austin, Valeria Bertacco:
Schnauzer: scalable profiling for likely security bug sites. 24:1-24:11 - Alexandre Duchateau, David A. Padua, Denis Barthou:
Hydra: Automatic algorithm exploration from linear algebra equations. 25:1-25:10 - Jialu Huang, Thomas B. Jablin, Stephen R. Beard, Nick P. Johnson, David I. August:
Automatically exploiting cross-invocation parallelism using runtime information. 26:1-26:11 - Marc de Kruijf, Karthikeyan Sankaralingam:
Idempotent code generation: Implementation, analysis, and evaluation. 27:1-27:12 - Alen Bardizbanyan, Peter Gavin, David B. Whalley, Magnus Själander, Per Larsson-Edefors, Sally A. McKee, Per Stenström:
Improving data access efficiency by using a tagless access buffer (TAB). 28:1-28:11 - Igor Rafael de Assis Costa, Péricles Rafael Oliveira Alves, Henrique Nazaré Santos, Fernando Magno Quintão Pereira:
Just-in-time value specialization. 29:1-29:11 - Bin Bao, Chen Ding:
Defensive loop tiling for shared cache. 30:1-30:11 - Jayvant Anantpur, R. Govindarajan:
Runtime dependence computation and execution of loops on heterogeneous systems. 31:1-31:10 - Yunsup Lee, Ronny Krashinsky, Vinod Grover, Stephen W. Keckler, Krste Asanovic:
Convergence and scalarization for data-parallel architectures. 32:1-32:11 - Raphael Ernani Rodrigues, Victor Hugo Sperle Campos, Fernando Magno Quintão Pereira:
A fast and low-overhead technique to secure programs against integer overflows. 33:1-33:11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.