Filters








1,227 Hits in 5.0 sec

Inserting Safe Memory Reuse Commands into ML-Like Programs [chapter]

Oukseh Lee, Hongseok Yang, Kwangkeun Yi
2003 Lecture Notes in Computer Science  
We present a static analysis that estimates reusable memory cells and a source-level transformation that adds explicit memory-reuse commands into the program text.  ...  For benchmark ML programs, our analysis and transformation achieves the memory reuse ratio from 5.2% to 91.3%.  ...  Overview Our goal is to automatically insert explicit memory-reuse commands into MLlike programs so that they should not blindly request memory when constructing data.  ... 
doi:10.1007/3-540-44898-5_10 fatcat:jyxdtsi66nhnpmrzdisj3f7jza

Static insertion of safe and effective memory reuse commands into ML-like programs

Oukseh Lee, Hongseok Yang, Kwangkeun Yi
2005 Science of Computer Programming  
We present a static analysis that estimates reusable memory cells and a source-level transformation that adds explicit memory reuse commands into the program text.  ...  For benchmark ML programs, our analysis and transformation system achieves a memory reuse ratio from 5.2% to 91.3% and reduces the memory peak from 0.0% to 71.9%.  ...  Overview Our goal is to automatically insert explicit memory reuse commands into ML-like programs so that they do not blindly request memory when constructing data.  ... 
doi:10.1016/j.scico.2005.02.007 fatcat:d2zpmze2zre5hmwtojdqlx4myy

Experiments on the effectiveness of an automatic insertion of memory reuses into ML-like programs

Oukseh Lee, Kwangkeun Yi
2004 Proceedings of the 4th international symposium on Memory management - ISMM '04  
We present extensive experimental results on our static analysis and source-level transformation [12, 11] that adds explicit memory-reuse commands into ML program text.  ...  The transformed programs reuse 3.8% to 88.6% of total allocated memory cells, and the memory peak is reduced by 0.0% to 71.9%.  ...  ANALYSIS AND TRANSFORMATION We first briefly explain our analysis and transformation that adds safe memory reuse commands into ML-like programs [12] .  ... 
doi:10.1145/1029873.1029885 dblp:conf/iwmm/LeeY04 fatcat:lppcozzetvd67itc3uyc4xnvya

Author Index

2005 Science of Computer Programming  
Yi, Static insertion of safe and effective memory reuse commands into ML-like programs (1-2) 141-178 Lin, C., see S., R., E. Yahav, E.K. Kolodner and M.  ...  Sagiv, Establishing local temporal heap safety properties with applications to compiletime memory management (1-2) 264-289 Shanneb, A., J. Potter and J.  ... 
doi:10.1016/s0167-6423(05)00127-9 fatcat:uyc7m35yxrcohmotmhu73ggziq

Static Analysis Symposium 2003

Radhia Cousot
2005 Science of Computer Programming  
Hermenegildo, Germán Puebla, Francisco Bueno and Pedro López-García -Static insertion of safe and effective memory reuse commands into ML-like programs Oukseh Lee, Hongseok Yang and Kwangkeun Yi -Abstract  ...  Static Analysis is a research area aimed at developing principles and tools for verification and semantics-based manipulation of programs and high performance implementations of programming languages.  ... 
doi:10.1016/j.scico.2005.04.002 fatcat:icjf2bhuqjdlhl4krepcuwbco4

Traceable data types for self-adjusting computation

Umut A. Acar, Guy Blelloch, Ruy Ley-Wild, Kanat Tangwongsan, Duru Turkoglu
2010 Proceedings of the 2010 ACM SIGPLAN conference on Programming language design and implementation - PLDI '10  
structure, it requires keeping a large computation trace (often proportional to the runtime of the program on the current input), and it introduces moderately large constant factors in practice.  ...  We develop a semantics for tracing, extend an existing self-adjusting language, ΔML, and its implementation to support traceable data types, and present an experimental evaluation by considering a number  ...  The Tgt Language The ΔML language (Section 2) is compiled into the Tgt language by the ΔML compiler.  ... 
doi:10.1145/1806596.1806650 dblp:conf/pldi/AcarBLTT10 fatcat:olkft5pnabhahk3gw7bh7ir74u

Traceable data types for self-adjusting computation

Umut A. Acar, Guy Blelloch, Ruy Ley-Wild, Kanat Tangwongsan, Duru Turkoglu
2010 SIGPLAN notices  
structure, it requires keeping a large computation trace (often proportional to the runtime of the program on the current input), and it introduces moderately large constant factors in practice.  ...  We develop a semantics for tracing, extend an existing self-adjusting language, ΔML, and its implementation to support traceable data types, and present an experimental evaluation by considering a number  ...  The Tgt Language The ΔML language (Section 2) is compiled into the Tgt language by the ΔML compiler.  ... 
doi:10.1145/1809028.1806650 fatcat:sivghn244ve3tgwuff422f5zty

Memory safety without runtime checks or garbage collection

Dinakar Dhurjati, Sumant Kowshik, Vikram Adve, Chris Lattner
2003 Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems - LCTES '03  
subclass of type-safe C programs.  ...  Traditional approaches to enforcing memory safety of programs rely heavily on runtime checks of memory accesses and on garbage collection, both of which are unattractive for embedded applications.  ...  Safe languages like Java [10] , Modula-3, ML, Safe-C [1] , Cyclone [13] and CCured [22] use a variety of runtime checks before individual memory operations such as bounds checks for array references  ... 
doi:10.1145/780742.780743 fatcat:bf53xshuvjfyfa4zjuhsivgkfm

Memory safety without runtime checks or garbage collection

Dinakar Dhurjati, Sumant Kowshik, Vikram Adve, Chris Lattner
2003 SIGPLAN notices  
subclass of type-safe C programs.  ...  Traditional approaches to enforcing memory safety of programs rely heavily on runtime checks of memory accesses and on garbage collection, both of which are unattractive for embedded applications.  ...  Safe languages like Java [10] , Modula-3, ML, Safe-C [1] , Cyclone [13] and CCured [22] use a variety of runtime checks before individual memory operations such as bounds checks for array references  ... 
doi:10.1145/780731.780743 fatcat:3m44vcvcovb6fo6g5jm2ihk6y4

Memory safety without runtime checks or garbage collection

Dinakar Dhurjati, Sumant Kowshik, Vikram Adve, Chris Lattner
2003 Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems - LCTES '03  
subclass of type-safe C programs.  ...  Traditional approaches to enforcing memory safety of programs rely heavily on runtime checks of memory accesses and on garbage collection, both of which are unattractive for embedded applications.  ...  Safe languages like Java [10] , Modula-3, ML, Safe-C [1] , Cyclone [13] and CCured [22] use a variety of runtime checks before individual memory operations such as bounds checks for array references  ... 
doi:10.1145/780732.780743 dblp:conf/lctrts/DhurjatiKAL03 fatcat:zxqiboecfnat5cdb47eizpn5ly

Compiling self-adjusting programs with continuations

Ruy Ley-Wild, Matthew Fluet, Umut A. Acar
2008 SIGPLAN notices  
We validate the feasibility of our proposal by extending Standard ML and by integrating the transformation into MLton, a whole-program optimizing compiler for Standard ML.  ...  Rewriting an ordinary program into a self-adjusting program with these primitives, however, can be difficult and error-prone due to various monadic and proper-usage restrictions, some of which cannot be  ...  Section 5 shows how ASrc programs are compiled into SATgt programs by a cps transformation that uses ASrc annotations to insert primitives for selfadjusting computation.  ... 
doi:10.1145/1411203.1411249 fatcat:dani5lnjizgufoke3rwvyw4fuq

Compiling self-adjusting programs with continuations

Ruy Ley-Wild, Matthew Fluet, Umut A. Acar
2008 Proceeding of the 13th ACM SIGPLAN international conference on Functional programming - ICFP '08  
We validate the feasibility of our proposal by extending Standard ML and by integrating the transformation into MLton, a whole-program optimizing compiler for Standard ML.  ...  Rewriting an ordinary program into a self-adjusting program with these primitives, however, can be difficult and error-prone due to various monadic and proper-usage restrictions, some of which cannot be  ...  Section 5 shows how ASrc programs are compiled into SATgt programs by a cps transformation that uses ASrc annotations to insert primitives for selfadjusting computation.  ... 
doi:10.1145/1411204.1411249 dblp:conf/icfp/Ley-WildFA08 fatcat:cmaoz3prwrhabkfmohrtnncm7e

Differential Datalog

Leonid Ryzhyk, Mihai Budiu
2019 Datalog  
However, the execution model of DDlog is fully incremental : at runtime DDlog programs receive streams of changes to the input relations (insertions or deletions) and produce streams of corresponding changes  ...  A DDlog programmer writes traditional, non-incremental Datalog programs.  ...  The compiler also generates a command-line interface program (CLI) that allows users to interact with the DDlog program directly via a command line or a script.  ... 
dblp:conf/datalog/RyzhykB19 fatcat:s3t5vtdoxvcvlh3aelemi5w2ay

Open-hardware wireless controller and 3D-printed pumps for efficient liquid manipulation

Gervasi Alain, Cardol Pierre, E. Meyer Patrick
2021 HardwareX  
The programming of the microcontroller is performed on the Arduino IDE.  ...  We would like to thank Gwenaël Gain for providing cell cultures and Nicolas Juste for his participation in the device development and validation during his internship.  ...  The two fixed calibration values (ml/turn and thread/mm) must first be entered in the JSON and imported into the SPIFF memory.  ... 
doi:10.1016/j.ohx.2021.e00199 pmid:35601242 pmcid:PMC9121357 fatcat:batrclortfcebcdkrxtrfinkwu

Secure virtual architecture

John Criswell, Andrew Lenharth, Dinakar Dhurjati, Vikram Adve
2007 ACM SIGOPS Operating Systems Review  
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications.  ...  A virtual machine implementing SVA achieves these goals by using a novel approach that exploits properties of existing memory pools in the kernel and by preserving the kernel's explicit control over memory  ...  Acknowledgements We would like to thank our shepherd, Adrian Perrig, and the anonymous reviewers for their extensive and helpful feedback on the paper.  ... 
doi:10.1145/1323293.1294295 fatcat:735u6minbvdk3bipx53qhavhri
« Previous Showing results 1 — 15 out of 1,227 results