International audienceSource-code isolation finds and extracts the hotspots of an application as independent isolated fragments of code, called codelets. Codelets can be modified, compiled, run, and measured independently from the original application. Source-code isolation reduces benchmarking cost and allows piece-wise optimization of an application. Source-code isolation is faster than whole-program benchmarking and optimization since the user can concentrate only on the bottlenecks. This paper examines the viability of using isolated codelets in place of the original application for performance characterization and optimization. On the NAS benchmarks, we show that codelets capture 92.3% of the original execution time. We present a set o...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
The productivity of a (team of) developer(s) can be expressed as a ratio between effort and delivere...
203 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2002.This thesis presents a hardwa...
International audienceThis article presents Codelet Extractor and REplayer (CERE), an open-source fr...
International audienceSystem selection aims at finding the best architecture for a set of programs a...
With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees ...
In high performance computing, benchmarks evaluate architectures, compilers and optimizations. Stand...
Software performance is considered a major concern when writing efficient code. In the past, develop...
Performance bounds represent the best achievable performance that can be delivered by target microar...
Modern computing hardware has a very good task parallelism, but resource contention between tasks re...
Gao, Guang R.The upcoming exa-scale era requires a parallel program execution model capable of achie...
International audienceThe design of an embedded system is often heavily constrained by its performan...
Abstract — Portable mobile code is often executed by a host virtual machine using just-in-time compi...
In this dissertation, we show that source-to-source optimization is an efficient method to generate ...
Abstract. The increasing complexity of hardware features in modern processors makes compilation for ...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
The productivity of a (team of) developer(s) can be expressed as a ratio between effort and delivere...
203 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2002.This thesis presents a hardwa...
International audienceThis article presents Codelet Extractor and REplayer (CERE), an open-source fr...
International audienceSystem selection aims at finding the best architecture for a set of programs a...
With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees ...
In high performance computing, benchmarks evaluate architectures, compilers and optimizations. Stand...
Software performance is considered a major concern when writing efficient code. In the past, develop...
Performance bounds represent the best achievable performance that can be delivered by target microar...
Modern computing hardware has a very good task parallelism, but resource contention between tasks re...
Gao, Guang R.The upcoming exa-scale era requires a parallel program execution model capable of achie...
International audienceThe design of an embedded system is often heavily constrained by its performan...
Abstract — Portable mobile code is often executed by a host virtual machine using just-in-time compi...
In this dissertation, we show that source-to-source optimization is an efficient method to generate ...
Abstract. The increasing complexity of hardware features in modern processors makes compilation for ...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
The productivity of a (team of) developer(s) can be expressed as a ratio between effort and delivere...
203 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2002.This thesis presents a hardwa...