Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization

Buy
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations
are, they are no substitute for good application algorithms. Consider the case of
sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful
optimizer will always out-perform a selection sort algorithm compiled with the most
powerful optimizer. Or consider the case of solving systems of equations. For sufficiently
large data sets, a Gaussian Elimination algorithm compiled with a less powerful optimizer
will always out-perform a Cramer’s rule algorithm compiled with the most powerful optimizer.

Developers of optimizing compilers also have an opportunity to leverage an under-used
asset. There are several high-quality numerical libraries that are publicly available, such
as the BLAS and LAPACK, that provide broadly applicable algorithms for scientific and
engineering computing. Vendors of high performance computers often provide versions of
these libraries that have been highly tuned to their particular system architecture. Users of
high performance computers sometimes employ these libraries. Unfortunately, many users
are unaware of their existence, and don’t use them even when they are available.

What if compilers could recognize a poor algorithp written by a user, and replace it
with the best implementation of a better algorithm that solves the same problem? Given
reasonable implementations of both algorithms, such a replacement would result in as
significant performance improvement. This book explains an approach that makes this
possible.

The scope over which compilers perform optimizations has steadily increased in the
past three decades. Initially, they performed optimizations on a sequence of statements that
would be executed as a unit, e.g. a basic block. During the 1970’s, researchers developed
control flow analysis, data flow analysis and name association algorithms. This made it
possible for compilers to do optimizations across an entire procedure. During the 1980’s,
researchers extended these analyses across procedure boundaries (lo), as well as adding
side effect analysis (9). This made it possible for compilers to do optimizations across an
entire program.
(HTML tags aren't allowed.)

Cloud Development and Deployment with Cloudbees (Community Experience Distilled)
Cloud Development and Deployment with Cloudbees (Community Experience Distilled)

All technology evangelists talk about revolutions. Even they just have a classic product to demonstrate. So, if I tell you that the Cloud will change the IT industry, you may consider that I'm biased, being a CloudBees employee. Anyway, I'm convinced that a huge shift has been introduced by the Cloud technologies and the way in which...

Antimicrobial Pharmacodynamics in Theory and Clinical Practice (Infectious Disease and Therapy)
Antimicrobial Pharmacodynamics in Theory and Clinical Practice (Infectious Disease and Therapy)

This up-to-the-minute reference explores the pharmacodynamics of antimicrobials as well as the absorption, distribution, metabolism, and elimination of the major classes of antimicrobials-covering new agents such as ketolide antibiotics and highlighting the pharmacodynamic relationship between drug concentration and antimicrobial activity, as...

Intermediate Accounting: Principles and Analysis
Intermediate Accounting: Principles and Analysis

Now readers can get all the accuracy and authority of the best-selling intermediate accounting book in the new second edition of this brief, streamlined version! Fundamentals of Intermediate Accounting presents a balanced discussion of concepts and applications, explaining the rationale behind business transactions before addressing the...


Modern Recording Techniques (Audio Engineering Society Presents)
Modern Recording Techniques (Audio Engineering Society Presents)

Master the tools and day-to-day practices of music recording and production. Learn the ins and outs of room acoustics and designing a studio. Gain techniques for mic placement and running a session. Get a solid grounding in both theory and industry practice. Modern Recording Techniques, the bestselling, authoritative guide to...

Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Every year, organizations rely on Internet applications and services more deeply–and every year, Internet infrastructure grows more powerful and complex. As the limitations of traditional IPv4 addressing become increasingly apparent, many decision makers recognize that a transition to IPv6 is needed far sooner than anticipated. Global...
Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy