The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SIMD (Single Instruction Multiple Data) extensions are acceleration components integrated in general processor, aiming at extracting instruction and data level parallelism of multimedia and scientific calculation programs. Currently, most of the automatic vectorization methods for SIMD architectures are based on innermost loops. Inner loop vectorization is the common approach for auto-vectorization...
Automatic decomposition is an optimization technique that distributes computation and data onto different processors. The consequence of decomposition directly affects the performance of parallel program. Since every computing node has its own memory in distributed memory parallel computers (DMPCs), false dependence does not hinder the parallelism. Affine decomposition is an effective method to represent...
When applying Loop Fusion technology in the existing parallelizing compiler systems, the combined loop may not gain better parallel efficiency due to the lack of the consideration to the cost analysis of parallel loops. By improving the execution process of parallelizing compiler systems, we proposed a nested loop fusion algorithm based on cost analysis. It can not only optimize the execution process...
Linear dependence tests determine the dependences with linear array subscripts, but only give the passive results for those with nonlinear ones. That is to say, dependences exist as long as there are nonlinear cases, which may lead to pseudo-dependences. However, to maximize the parallelism of applications and improve the credibility of the optimizing compiler, it is necessary to develop a nonlinear...
With the rapidly development of virus technology, the number of malicious code has continued to increase. So it is imperative to optimize the traditional manual analysis method by automatic maliciousness decision system. Motivated by the inference technique for detecting viruses, and a recent successful classification method, we explore Radux-an automatic software maliciousness decision system. It...
Discontinuous references to memory and misalignment of memory access mode can have great impact on program performance in auto-vectorization. Different target-specific architecture may have different influence on vectorization performance. As a popular technology in recent years, the multimedia extension technique is important in the vectorization field. Supported by special processing unit in microprocessors,...
Using GPU for general computing has become an important research direction in high performance computing technology. However, this is not a lossless optimization method. Due to the impact of device initialization cost, data transmission delay, specific characteristics of programs, and other factors, the general computing on GPU may not always achieve the desired speedup, and sometimes results in program...
Network traffic generation is a vital part of traffic research as the exponential growth of the number of servers, as well as the number of users. Various researchers have reported traffic analysis that demonstrates different results of traffic modeling, such as Poisson distribution or considerable burstiness on a range of time scales with properties of self-similarity. Due to the distinct standpoint...
The research of network test grows rapidly with the development of network technology. People need more flexible network test and platform to estimate their network equipment, and the scholars need more flexible mathematics model to describe and generate the network traffic or test traffic. In this paper, we introduce a GI/G/m/??/FCFS multi-class open queuing network model for generating stochastic...
Self-similarity is the one of important characteristics of real network traffic. In order to simulate the network traffic accurately, we present a technology of self-similar network traffic generation, and describe it from algorithm and hardware.On algorithm we analyze several typical self-similar traffic models, describe the superiority of multifractal wavelet in detail, and make it our generation...
The new features of IA-64 SIMD instructions make it difficult to map the semantics of machine instructions to higher-level intermediate representations, which is the key problem to binary reverse engineering. This paper presents an effective approach to semantic mapping of IA-64 SIMD instructions, improving existing technologies in two aspects. Our techniques extend the syntax of existing SSL according...
This paper presents an effective approach to semantic abstraction of IA-64 multimedia instructions, which is important to binary translation. In particular, the authors take example for multimedia instructions used in motion estimation to describe the details of generating higher-level intermediate representation from IA-64 assembly language. Finally, the originality and soundness of the approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.