Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/800230.806986acmconferencesArticle/Chapter ViewAbstractPublication PagesplanConference Proceedingsconference-collections
Article
Free access

Optimization of range checking

Published: 01 June 1982 Publication History

Abstract

An analysis is given for optimizing run-time range checks in regions of high execution frequency. These optimizations are accomplished using strength reduction, code motion and common subexpression elimination. Test programs, using the above optimizations, are used to illustrate run-time improvements.

References

[1]
Allen F. and Cocke J., A Programming Data Flow Analysis Procedure, CACM Vol 19, (3 March 1976); 137-147.
[2]
Cocke J. and Markstein P., Measurement of Code Improvement Algorithms, Proceedings of IFIPS (1980); 221-228.
[3]
Harrison W., Compiler Analysis of the Value Ranges for Variables, IEEE Transactions on Software Engineering, (May 1977); 243-250.
[4]
Schwartz J.T., On Programming - An Interim Report on the SETL Project. Installment II: The SETL Language and Examples of Its Use, Courant Institute of Mathematical Sciences, N.Y.U., (1973); 293-310.
[5]
Welsh, J., Economic Range Checks in Pascal, Software - Practice and Experience, (1978); Vol. 8, 85-97

Cited By

View all
  • (2023)Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control SystemsProceedings of the 2023 European Interdisciplinary Cybersecurity Conference10.1145/3590777.3590785(47-52)Online publication date: 14-Jun-2023
  • (2014)WatchdogLiteProceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization10.1145/2581122.2544147(175-184)Online publication date: 15-Feb-2014
  • (2014)WatchdogLiteProceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization10.1145/2544137.2544147(175-184)Online publication date: 15-Feb-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGPLAN '82: Proceedings of the 1982 SIGPLAN symposium on Compiler construction
June 1982
357 pages
ISBN:0897910745
DOI:10.1145/800230
  • cover image ACM SIGPLAN Notices
    ACM SIGPLAN Notices  Volume 17, Issue 6
    Proceedings of the 1982 SIGPLAN symposium on Compiler construction
    June 1982
    347 pages
    ISSN:0362-1340
    EISSN:1558-1160
    DOI:10.1145/872726
    Issue’s Table of Contents

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1982

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)98
  • Downloads (Last 6 weeks)17
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control SystemsProceedings of the 2023 European Interdisciplinary Cybersecurity Conference10.1145/3590777.3590785(47-52)Online publication date: 14-Jun-2023
  • (2014)WatchdogLiteProceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization10.1145/2581122.2544147(175-184)Online publication date: 15-Feb-2014
  • (2014)WatchdogLiteProceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization10.1145/2544137.2544147(175-184)Online publication date: 15-Feb-2014
  • (2013)Model Checking Stencil Computations Written in a Partitioned Global Address Space LanguageProceedings of the 2013 IEEE 27th International Symposium on Parallel and Distributed Processing Workshops and PhD Forum10.1109/IPDPSW.2013.90(365-374)Online publication date: 20-May-2013
  • (2011)Eliminating partially-redundant array-bounds check in the Android Dalvik JIT compilerProceedings of the 9th International Conference on Principles and Practice of Programming in Java10.1145/2093157.2093175(121-128)Online publication date: 24-Aug-2011
  • (2011)Exploiting static application knowledge in a Java compiler for embedded systemsProceedings of the 9th International Workshop on Java Technologies for Real-Time and Embedded Systems10.1145/2043910.2043927(96-105)Online publication date: 26-Sep-2011
  • (2009)Array Bounds Check Elimination for Java Based on Sparse RepresentationProceedings of the 2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications10.1109/SERA.2009.11(189-196)Online publication date: 2-Dec-2009
  • (2007)Bounds checking with taint-based analysisProceedings of the 2nd international conference on High performance embedded architectures and compilers10.5555/1762146.1762155(71-86)Online publication date: 28-Jan-2007
  • (2007)Speculative optimization using hardware-monitored guarded regions for java virtual machinesProceedings of the 3rd international conference on Virtual execution environments10.1145/1254810.1254814(22-32)Online publication date: 13-Jun-2007
  • (2005)An electric fence for kernel buffersProceedings of the 2005 ACM workshop on Storage security and survivability10.1145/1103780.1103786(37-43)Online publication date: 11-Nov-2005
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media