• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,541
Next 10 →

Fast and Efficient Generation of Loop Bounds

by Zbigniew Chamski - PROCEEDINGS OF PARCO '93, ELSEVIER SCIENCE PUBLISHERS (NORTH , 1993
"... Current loop generation techniques are based on Fourier-Motzkin pairwaise elimination, which is known to be very memory- and computationintensive. In this paper we explore an alternative way: the use of parametric linear programming, which allows to separate the computation of distinct loop bounds ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
bounds and leads to a parallel algorithm for loop generation.

Test-Based Inference of Polynomial Loop-Bound Functions

by Olha Shkaravska, Rody Kersten, Marko Van Eekelen , 2010
"... This paper presents an interpolation-based method of inferring arbitrary degree loop-bound functions for Java programs. Given a loop, by its “loop-bound function ” we mean a function with the numeric program variables as its parameters, that is used to bound the number of loop-iterations. Using our ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
This paper presents an interpolation-based method of inferring arbitrary degree loop-bound functions for Java programs. Given a loop, by its “loop-bound function ” we mean a function with the numeric program variables as its parameters, that is used to bound the number of loop-iterations. Using our

Formal Verification of Loop Bound Estimation for WCET Analysis

by Rine Blazy, Andre Maroneze, David Pichardie
"... Worst-case execution time (WCET) estimation tools are complex pieces of software performing tasks such as computation on control flow graphs (CFGs) and bound calculation. In this paper, we present a formal verification (in Coq) of a loop bound estimation. It relies on program slicing and bound calcu ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Worst-case execution time (WCET) estimation tools are complex pieces of software performing tasks such as computation on control flow graphs (CFGs) and bound calculation. In this paper, we present a formal verification (in Coq) of a loop bound estimation. It relies on program slicing and bound

Data-Flow Based Detection of Loop Bounds

by Christoph Cullmann, Florian Martin, Absint Angewandte, Informatik Gmbh - In Workshop on Execution-Time Analysis (WCET , 2007
"... To calculate the WCET of a program, safe upper bounds on the number of loop iterations for all loops in the program are needed. As the manual annotation of all loops with such bounds is difficult and time consuming, the WCET analyzer aiT originally developed by Saarland University and AbsInt GmbH us ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
To calculate the WCET of a program, safe upper bounds on the number of loop iterations for all loops in the program are needed. As the manual annotation of all loops with such bounds is difficult and time consuming, the WCET analyzer aiT originally developed by Saarland University and AbsInt Gmb

Quantum complexity theory

by Ethan Bernstein, Umesh Vazirani - in Proc. 25th Annual ACM Symposium on Theory of Computing, ACM , 1993
"... Abstract. In this paper we study quantum computation from a complexity theoretic viewpoint. Our first result is the existence of an efficient universal quantum Turing machine in Deutsch’s model of a quantum Turing machine (QTM) [Proc. Roy. Soc. London Ser. A, 400 (1985), pp. 97–117]. This constructi ..."
Abstract - Cited by 574 (5 self) - Add to MetaCart
–117]. This construction is substantially more complicated than the corresponding construction for classical Turing machines (TMs); in fact, even simple primitives such as looping, branching, and composition are not straightforward in the context of quantum Turing machines. We establish how these familiar primitives can

Loopus- A Tool for Computing Loop Bounds for C Programs

by Moritz Sinn, Tu Darmstadt, Florian Zuleger, Tu Wien
"... We describe the current state of our tool Loopus which computes loop bounds for C programs. In this one-page abstract we describe the current state of our tool Loopus which automatically computes loop bounds for C programs. Loopus can also be seen as contribution towards solving the termination prob ..."
Abstract - Add to MetaCart
We describe the current state of our tool Loopus which computes loop bounds for C programs. In this one-page abstract we describe the current state of our tool Loopus which automatically computes loop bounds for C programs. Loopus can also be seen as contribution towards solving the termination

Automatic Derivation of Loop Bounds and Infeasible Paths for WCET Analysis Using Abstract Execution

by Jan Gustafsson, Andreas Ermedahl, Christer S - In RTSS , 2006
"... Static Worst-Case Execution Time (WCET) ana-lysis is a technique to derive upper bounds for the ex-ecution times of programs. Such bounds are crucial when designing and verifying real-time systems. A key component for statically deriving safe and tight WCET bounds is information on the possible prog ..."
Abstract - Cited by 50 (10 self) - Add to MetaCart
present a method for deriving such flow information called abstract execution. This method can automatically calculate loop bounds, bounds for including nested loops, as well as many types of in-feasible paths. Our evaluations show that it can calcu-late WCET estimates automatically, without any user

Two–Loop Bound–State Calculations and Squared Decay Rates

by Ulrich D. Jentschura A, Christoph H. Keitel A, Krzysztof Pachucki B, Fakultät Physik Der Albert–ludwigs–universität, Theoretische Quantendynamik , 2003
"... Abstract We discuss the ǫ-method as used in various recent QED bound-state calculations by considering mathematical model examples. Recently obtained results for higher-order self-energy binding corrections at the two-loop level are reviewed. Problems associated with the interpretation of squared de ..."
Abstract - Add to MetaCart
Abstract We discuss the ǫ-method as used in various recent QED bound-state calculations by considering mathematical model examples. Recently obtained results for higher-order self-energy binding corrections at the two-loop level are reviewed. Problems associated with the interpretation of squared

Loop Bound Analysis based on a Combination of Program Slicing, Abstract Interpretation, and Invariant Analysis †

by Andreas Ermedahl, Christer S, Jan Gustafsson, Stefan Bygde, Björn Lisper
"... Static Worst-Case Execution Time (WCET) analysis is a technique to derive upper bounds for the execution times of programs. Such bounds are crucial when designing and verifying real-time systems. A key component for static derivation of precise WCET estimates is upper bounds on the number of times d ..."
Abstract - Cited by 22 (3 self) - Add to MetaCart
different loops can be iterated. In this paper we present an approach for deriving upper loop bounds based on a combination of standard program analysis techniques. The idea is to bound the number of different states in the loop which can influence the exit conditions. Given that the loop terminates

Scanning Polyhedra with DO Loops

by Corinne Ancourt, François Irigoin , 1991
"... Supercompilers perform complex program transformations which often result in new loop bounds. This paper shows that, under the usual assumptions in automatic parallelization, most transformations on loop nests can be expressed as affine transformations on integer sets de ned by polyhedra and that th ..."
Abstract - Cited by 216 (5 self) - Add to MetaCart
Supercompilers perform complex program transformations which often result in new loop bounds. This paper shows that, under the usual assumptions in automatic parallelization, most transformations on loop nests can be expressed as affine transformations on integer sets de ned by polyhedra
Next 10 →
Results 1 - 10 of 3,541
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University