Targeted optimization of program segments can provide an additional program speedup over the highest default op-timization level, such as-O3 in GCC. The key challenge is how to automatically search for performance sensitive pro-gram segments in a given code, to which a customized set of optimization compiler options could be applied. In this paper we propose a method for automatic detec-tion of performance sensitive program segments based on program segment similarity. First we create a proxy seg-ment template database trained over a set of random in-put programs. The compiler identifies program segments by correlating them to the pre-build proxy segment templates using the syntax structure and architecture-dependent be-havior similarity. W...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
This book explores break-through approaches to tackling and mitigating the well-known problems of co...
We consider the problem of program clone search, i.e. given a target program and a repository of kno...
The highest optimization level of a compiler, such as-O3 in GCC, does not ensure the best performanc...
Cavazos, JohnIt has been shown that machine-learning driven optimizations often outperform bundled o...
λSignatures are proposed as a method to express the behavior of code and judge its simi-larity. We p...
We present a technique to measure and detect changes in the behavioral patterns of applications. In ...
Developing an optimizing compiler for a newly proposed architecture is extremely difficult when ther...
Applying the right compiler optimizations to a particular program can have a significant impact on p...
Many optimisations in modern compilers have been traditionally based around using analysis to examin...
International audienceIterative search combined with machine learning is a promising approach to des...
This paper presents an automated performance tuning solution, which partitions a program into a numb...
This article aims at making iterative optimization practical and usable by speeding up the evaluatio...
This paper proposes the use of empirical modeling techniques for building microarchitecture sensitiv...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
This book explores break-through approaches to tackling and mitigating the well-known problems of co...
We consider the problem of program clone search, i.e. given a target program and a repository of kno...
The highest optimization level of a compiler, such as-O3 in GCC, does not ensure the best performanc...
Cavazos, JohnIt has been shown that machine-learning driven optimizations often outperform bundled o...
λSignatures are proposed as a method to express the behavior of code and judge its simi-larity. We p...
We present a technique to measure and detect changes in the behavioral patterns of applications. In ...
Developing an optimizing compiler for a newly proposed architecture is extremely difficult when ther...
Applying the right compiler optimizations to a particular program can have a significant impact on p...
Many optimisations in modern compilers have been traditionally based around using analysis to examin...
International audienceIterative search combined with machine learning is a promising approach to des...
This paper presents an automated performance tuning solution, which partitions a program into a numb...
This article aims at making iterative optimization practical and usable by speeding up the evaluatio...
This paper proposes the use of empirical modeling techniques for building microarchitecture sensitiv...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
This book explores break-through approaches to tackling and mitigating the well-known problems of co...
We consider the problem of program clone search, i.e. given a target program and a repository of kno...