Scheduling transformations reorder the execution of operations in a program to improve locality and/or parallelism. The polyhedral model provides a general framework for performing instance-wise scheduling transformations for regular programs, reordering the iterations of loops that operate over dense arrays through transformations like tiling. There is no analogous framework for recursive programs—despite recent interest in optimizations like tiling and fusion for recursive applications. This paper presents PolyRec, the first general framework for applying scheduling transformations—like inlining, interchange, and code motion—to nested recursive programs and reasoning about their correctness. We describe the phases of PolyRec—representing ...
AbstractThis paper describes a new method of automatic generation of concurrent programs which const...
International audienceStarting from a generalization of induction variables,we present a dependence ...
Many modern (mobile) systems involve memory intensive computations. External memory accesses are cos...
Scheduling transformations reorder a program’s operations to improve locality and/or parallelism. Th...
The polyhedral model is known to be a powerful framework to reason about high level loop transformat...
International audienceThere may be a huge gap between the statements outlined by programmers in a pr...
We wish to extend the effectiveness of loop-restructuring compilers by improving the robustness of l...
Multi-core processors are now in widespread use in almost all areas of computing: desktops, laptops ...
High-level loop transformations change the order in which basic computations in a program are execut...
Loop-nests in most scientific applications perform repetitive operations on array(s) and account for...
In high-performance computing, one primary objective is to exploit the performance that the given ta...
International audienceIn this paper, we propose Rec2Poly, a framework which detects automatically if...
While there has been much work done on analyzing and transforming regular programs that operate over...
This paper explore the suggestion that some "irregular" programs are in fact regular on ot...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/18...
AbstractThis paper describes a new method of automatic generation of concurrent programs which const...
International audienceStarting from a generalization of induction variables,we present a dependence ...
Many modern (mobile) systems involve memory intensive computations. External memory accesses are cos...
Scheduling transformations reorder a program’s operations to improve locality and/or parallelism. Th...
The polyhedral model is known to be a powerful framework to reason about high level loop transformat...
International audienceThere may be a huge gap between the statements outlined by programmers in a pr...
We wish to extend the effectiveness of loop-restructuring compilers by improving the robustness of l...
Multi-core processors are now in widespread use in almost all areas of computing: desktops, laptops ...
High-level loop transformations change the order in which basic computations in a program are execut...
Loop-nests in most scientific applications perform repetitive operations on array(s) and account for...
In high-performance computing, one primary objective is to exploit the performance that the given ta...
International audienceIn this paper, we propose Rec2Poly, a framework which detects automatically if...
While there has been much work done on analyzing and transforming regular programs that operate over...
This paper explore the suggestion that some "irregular" programs are in fact regular on ot...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/18...
AbstractThis paper describes a new method of automatic generation of concurrent programs which const...
International audienceStarting from a generalization of induction variables,we present a dependence ...
Many modern (mobile) systems involve memory intensive computations. External memory accesses are cos...