A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hard-coding bottom-up code generation tables to save time and space
1991
Software, Practice & Experience
Code generators based on bottom-up rewrite systems (BURS) are automatically generated from machinedescription grammars. ...
They produce locally optimal code for expression trees, but their tables are large and require compile-time interpretation. ...
With hard code, these dropped to 13 and 35. Less predictably, hard-coding saves space. ...
doi:10.1002/spe.4380210102
fatcat:lpjixvki4zbnvl674gnfikaove
Machine cycle simulator for a microprocessor
1982
Microprocessors and microsystems
For new hard ware/software co-designed CPU architectures there is a need for fast and flexib le performance simu lation to perform extensive design space exp loration in both software and hardware do mains ...
The paper describes a method and system for bottom-up development and automated unit-level testing of FPGA-based cycle-accurate simulator leveraging functionality of existing software simu lator. ...
and Roman Khvatov. ...
doi:10.1016/0141-9331(82)90564-6
fatcat:qg4r6zlskvcnflv67lymxzjoge
Engineering a simple, efficient code-generator generator
1992
ACM Letters on Programming Languages and Systems
Many code generator generators use tree pattern matching and dynamic programming. This note describes a simple program that generates matchers that are fast, compact, and easy to understand. ...
It is simpler than common alternatives: 200-700 lines of Icon or 950 lines of C versus 3000 lines of C for Twig and 5000 for burg. Its matchers run up to 25 times faster than Twig's. ...
BURS table generation is more complicated, but BURS matchers generate optimal code in constant time per node. ...
doi:10.1145/151640.151642
fatcat:dmakwxm7zfb5bmvm6vwvwezryu
Dual-cache Structure Based Large Scale Texture Mapping for Real-time Terrain Rendering
2008
2008 IEEE Conference on Robotics, Automation and Mechatronics
In order to solve these problems, in this paper we propose a quadtree based indexing method to organize multi-resolution images and to fast retrieve data from disk; For memory updating, we present a real ...
There are two key problems in efficient large scale texture mapping for terrain rendering-efficient data organization and real time data updating in memory. ...
ACKNOWLEDGMENT The research work described in this paper was supported by grant from the National Natural Science Foundation of China (Project No.60703070) and grant from the National Natural Science Foundation ...
doi:10.1109/ramech.2008.4681477
dblp:conf/ram/TianWZ08
fatcat:lrapuzdy3zap7foqzkqhqvvu5m
The GoSam package: an overview
[article]
2012
arXiv
pre-print
The public code GOSAM for the computation of the one loop virtual corrections to scattering amplitudes in the Standard Model and beyond is presented. ...
Particular emphasis is devoted to the interface with other public tools via the Binoth Les Houches Accord. ...
A sample of the comparisons is given in Table 1 , while in Table 2 a list of timings is reported for the generation of the codes and the relative running time per phase space point. ...
arXiv:1209.6510v1
fatcat:ecqwepkkvbdo5mlufrlitlhb7e
Linux 2.6 kernel exploits
2007
Journal in Computer Virology
For one, applications in user space are better protected by the developers and the kernel than in the past. ...
Constraints such as execution context problems, module relocation, system calls usage prerequisites and kernel shellcode development have to be dealt with. ...
Acknowledgment I really would like to thank Daniel K. ...
doi:10.1007/s11416-007-0066-9
fatcat:gk7wylizxjcwjlkx3pbmo3gx7u
Links between the personalities, styles and performance in computer programming
2016
Journal of Systems and Software
We also found that in addition to having more programming experience and better academic achievement, the styles of working depth-first and saving coarse-grained revisions improve performance in programming ...
For example, modifying source code before acquiring knowledge of how a code works is a depth-first style and reading and understanding before modifying source code is a breadth-first style. ...
Especially the first author would like to thank Daniel Kulesz for his effective recommendations and all his warm support during data collection and Kornelia Kuhle for the English proofing of all the materials ...
doi:10.1016/j.jss.2015.09.011
fatcat:an7vqqpodbezlbqoanqmv67lm4
Scalable hybrid verification for embedded software
2011
2011 Design, Automation & Test in Europe
mixed bottom-up/top-down algorithm. ...
The results show that our approach scales better than stand-alone software model checkers to reach deep state spaces. ...
The authors also would like to thank Alexander Grünhage, Edgar Auerswald and Patrick Köcher for supporting the development of the Verifyr platform. ...
doi:10.1109/date.2011.5763039
dblp:conf/date/BehrendLHRKR11
fatcat:skickcenofetbmiwtizlinw4pq
ALPGEN, a generator for hard multiparton processes in hadronic collisions
2003
Journal of High Energy Physics
This paper presents a new event generator, ALPGEN, dedicated to the study of multiparton hard processes in hadronic collisions. ...
The code performs, at the leading order in QCD and EW interactions, the calculation of the exact matrix elements for a large set of parton-level processes of interest in the study of the Tevatron and LHC ...
The emission of additional hard gluons can however be calculated, and the current version of the code works with up to a 6 final-state jets. The subprocesses considered are listed in table 10 . ...
doi:10.1088/1126-6708/2003/07/001
fatcat:452hydffazecvd5hor353sdcfy
TrackOS: A Security-Aware Real-Time Operating System
[chapter]
2016
Lecture Notes in Computer Science
TrackOS checks a task's control stack against a statically-generated call graph, generated by an abstract interpretationbased tool that requires no source code. ...
We describe an approach to control-flow integrity protection for real-time systems. We present TrackOS , a security-aware realtime operating system. ...
The size of the call graph and TCB pointers are hard-coded into the task. ...
doi:10.1007/978-3-319-46982-9_19
fatcat:2wdvwthnjbhitgsdacayly2ta4
The Data Reduction Laboratory-an aid to the space scientist
1969
Proceedings of the 1969 24th national conference on -
The output image data, the input response data, and instruction code required to process the response make up a dialog node. ...
As reentrant routines are dynamically referenced from the code link or other routines, registers are saved/restored in a save area at the bottom of the control link. ...
Goddard Space Flight Center National Aeronautics and Space Administration Grcenbelt, Maryland, October 15, 1969 31 1-07-1 1-01-51 ...
doi:10.1145/800195.805966
fatcat:zdiveamshrh3dg4juj4o76ee2m
Fast computation of monochromatic infrared atmospheric transmittances using compressed look-up tables
1996
Optical Spectroscopic Techniques and Instrumentation for Atmospheric and Space Research II
A Singular Value Decomposition (SVD) is used to transform very large monochromatic look-up tables of absorption coefficients into a compressed representation that is almost 100 times smaller. ...
The algorithm is very simple to use in radiative transfer codes and is easily adapted to provide analytic Jacobians of radiances for sensitivity studies. ...
Acknowledgement LLS, RGB, SEH, and SDS-M were supported by NASA contract NAS5-31378. HEM acknowledges support from NASA Cooperative Agreement NCC-5- ...
doi:10.1117/12.256107
fatcat:rlui7teznbd6dngf2le3utzvky
Configuration and Performance of a Beowulf Cluster for Large-Scale Scientific Simulations
2005
Computing in science & engineering (Print)
two fundamental goals: to solve problems faster and to solve larger problems than we can on a serial computer. ...
I selected this problem to show how judiciously combining a numerical algorithm and its efficient implementation with the right hardware (in this case, the Beowulf cluster) can achieve parallel computing's ...
Table 3 reports the wall-clock times observed for the code in hours:minutes:seconds. ...
doi:10.1109/mcse.2005.29
fatcat:fpl46mov3bb3np4mns4mjospdi
A data acquisition platform for the development of a wind turbine condition monitoring system
2008
2008 International Conference on Condition Monitoring and Diagnosis
In order to determine different patterns of machinery deterioration, precise data of existing parameters at higher sampling frequencies up to 20 kHz is needed. ...
The requirements and limitations of the data acquisition application are discussed. ...
This database offers two types of tables: MyISAM and InnoDB. In either configuration up to 2TB of data can be saved in one table. ...
doi:10.1109/cmd.2008.4580521
fatcat:7yzv37fm7rdstp5r5fxobnr4hu
Selective mutation testing for concurrent code
2013
Proceedings of the 2013 International Symposium on Software Testing and Analysis - ISSTA 2013
However, performing mutation testing is expensive even for sequential code, and the cost is higher for concurrent code where each test has to be executed for many (possibly all) thread schedules. ...
mutants generated by this subset also kill (almost) all mutants generated by all mutation operators. ...
CCF-1012759 and CCF-0746856. ...
doi:10.1145/2483760.2483773
dblp:conf/issta/GligoricZPP13
fatcat:rmrzh5zokne3jni3j36rmihene
« Previous
Showing results 1 — 15 out of 83,190 results