International audienceA memory allocation anomaly occurs when the allocation of a set of heap blocks imposes an unnecessary overhead on the execution of an application. In this paper, we propose a method for identifying, locating, characterizing and fixing allocation anomalies, and a tool for developers to apply the method. We experiment our method and tool with a numerical simulator aimed at approximating the solutions to partial differential equations using a finite element method. We show that taming allocation anomalies in this simulator reduces the memory footprint of its processes by 37.27% and the execution time by 16.52%. We conclude that the developer of high-performance computing applications can benefit from the method and tool d...
The divergence between processor and memory performance has been a well discussed aspect of computer...
We present and evaluate a new memory management technique foreliminating memory leaks in programs wi...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...
International audienceA memory allocation anomaly occurs when the allocation of a set of heap blocks...
Nowadays students tend to forget about memory usage and disposal, as our computer systems get more a...
Memory management is the process of controlling and coordinating computer memory, assigning portions...
Memory bloat is loosely defined as an excessive memory usage by an application during its execution....
The allocation and disposal of memory is a ubiquitous operation in most programs. Rarely do programm...
In this paper we present a method for determining the cache performance of the loop nests in a progr...
The potential for improving the performance of data-intensive scientific programs by enhancing data ...
Dynamic memory management required by allocation-intensive (i.e., Object Oriented and linked data st...
To cope with the increasing difference between processor and main memory speeds, modern computer sys...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/16...
In recent years the High Performance Computing (HPC) industry has benefited from the development of ...
Abstract — We present and evaluate a new memory man-agement technique for eliminating memory leaks i...
The divergence between processor and memory performance has been a well discussed aspect of computer...
We present and evaluate a new memory management technique foreliminating memory leaks in programs wi...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...
International audienceA memory allocation anomaly occurs when the allocation of a set of heap blocks...
Nowadays students tend to forget about memory usage and disposal, as our computer systems get more a...
Memory management is the process of controlling and coordinating computer memory, assigning portions...
Memory bloat is loosely defined as an excessive memory usage by an application during its execution....
The allocation and disposal of memory is a ubiquitous operation in most programs. Rarely do programm...
In this paper we present a method for determining the cache performance of the loop nests in a progr...
The potential for improving the performance of data-intensive scientific programs by enhancing data ...
Dynamic memory management required by allocation-intensive (i.e., Object Oriented and linked data st...
To cope with the increasing difference between processor and main memory speeds, modern computer sys...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/16...
In recent years the High Performance Computing (HPC) industry has benefited from the development of ...
Abstract — We present and evaluate a new memory man-agement technique for eliminating memory leaks i...
The divergence between processor and memory performance has been a well discussed aspect of computer...
We present and evaluate a new memory management technique foreliminating memory leaks in programs wi...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...