Profiling can provide the information needed to identify performance bottlenecks in a program, but the programmer must understand its relation to the program source in order to use this information. This is difficult due to the tremendous volume of data collected. Moreover, program transformations such as macro expansion and procedure inlining can obscure the relationship between the source and object code. Higher-order programs present additional challenges due to complex control flow and because they often consist of many small, often anonymous, procedures whose individual performance properties may be less interesting than their characteristics as a group. To address these challenges we have implemented a profiler and interactive profile...
We present a technique to measure and detect changes in the behavioral patterns of applications. In ...
Input-sensitive profiling is a recent methodology for analyzing how the performance of a routine sca...
Abstract. Compilers can exploit knowledge that a variable has a fixed known value at a program point...
This paper describes the design and implementation of an optimizing compiler that automatically gene...
Abstract Profile-based optimizations can be used for instruction scheduling, loop scheduling, data p...
Developers use profilers to identify code that should be op-timized. For each block of code, develop...
The objective of this work is to improve look up for changes in source code performance and help to ...
This paper describes algorithms for inserting monitoring code to profile and trace programs. These a...
Abstract. High-level languages come with significant readability and maintain-ability benefits. Thei...
Profile-based optimizations can be used for instruction scheduling, loop scheduling, data preloading...
The scalability of performance tools in high performance computing has been lagging behind the growt...
VISSOFT 2017 : 2017 IEEE Working Conference on Software Visualization, 18-19 Sept. 2017, Shanghai, C...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
We present the Memory Trace Visualizer (MTV), a tool that provides interactive visualization and ana...
We present a technique to measure and detect changes in the behavioral patterns of applications. In ...
Input-sensitive profiling is a recent methodology for analyzing how the performance of a routine sca...
Abstract. Compilers can exploit knowledge that a variable has a fixed known value at a program point...
This paper describes the design and implementation of an optimizing compiler that automatically gene...
Abstract Profile-based optimizations can be used for instruction scheduling, loop scheduling, data p...
Developers use profilers to identify code that should be op-timized. For each block of code, develop...
The objective of this work is to improve look up for changes in source code performance and help to ...
This paper describes algorithms for inserting monitoring code to profile and trace programs. These a...
Abstract. High-level languages come with significant readability and maintain-ability benefits. Thei...
Profile-based optimizations can be used for instruction scheduling, loop scheduling, data preloading...
The scalability of performance tools in high performance computing has been lagging behind the growt...
VISSOFT 2017 : 2017 IEEE Working Conference on Software Visualization, 18-19 Sept. 2017, Shanghai, C...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
. We present a technique to measure and detect changes in the behavioral patterns of applications. I...
We present the Memory Trace Visualizer (MTV), a tool that provides interactive visualization and ana...
We present a technique to measure and detect changes in the behavioral patterns of applications. In ...
Input-sensitive profiling is a recent methodology for analyzing how the performance of a routine sca...
Abstract. Compilers can exploit knowledge that a variable has a fixed known value at a program point...