Optimizations, a critical element within the compiler pipeline, is responsible for improving the efficiency of generated code. In this paper, we take a different angle to evaluate compiler optimizations than all exist...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Optimizations, a critical element within the compiler pipeline, is responsible for improving the efficiency of generated code. In this paper, we take a different angle to evaluate compiler optimizations than all existing works in compiler testing literature. In particular, we consider a specific scenario in software development, that is, when developers manually optimize a program to improve its performance, do compilers actually generate more efficient code withthe help of developers' optimizations? To answer this question, we develop a simple approach which consists of (1) transforming a program into the same or less efficient version of the original program, and then (2) comparing the performance of the generated code from each version of the source code. Consequently, the original program can be treated as an optimized version of the transformed program. We use the approach to evaluate GCC and LLVM, two industry compilers, and observe that the extra optimizations presented in the original programs can be not only unhelpful, but more seriously counterproductive to both GCC and LLVM, resulting in the less efficient code generated overall. Out of our evaluation results, we summarized and reported 53 LLVM and 18 GCC defects, out of which 37 and 17 have been confirmed or fixed.
A large-scale facility with bespoke HVAC systems was used to generate a high-gradient thermal stratification in a space of ceiling height 9.5m by controlling supply temperatures at high level to 28°C and at low l...
详细信息
the window opening shape, size, and location can much affect the natural ventilation performance. Most windows for building ventilation have not undergone an optimal design. this study adopted an adjoint based topolog...
详细信息
A CNC machine may contain various types of faults and may harm production safety in multiple ways. It is difficult for managers to determine which faults are more severe due to the complex structure of the machine. th...
详细信息
ISBN:
(数字)9781665490429
ISBN:
(纸本)9781665490429
A CNC machine may contain various types of faults and may harm production safety in multiple ways. It is difficult for managers to determine which faults are more severe due to the complex structure of the machine. this further confuses managers to generate efficient preventions and responses. Consequently, there is a need to develop a method to assist production managers to identify the safety-critical components (SCCs) in a CNC machine. the current work developed a solid framework for SCCs examination using a risk-based knowledge graph method. Firstly, we summarize the structure of the CNC machine using ontology and examine CNC faults and corresponding consequences. the reasoning between faults and consequences is via literature examination using a web-crawler. this is followed by using BiLSTM-CRF for knowledge processing and using TransE for entity alignment. then, a risk-based knowledge graph is developed via developing a weight scale for the severity of consequence;and using historical fault data to access frequency. the knowledge graph visualization is developed using Gephi, and SCCs can be virtually determined with deeper color in nodes as the darker color represents higher risk. this has the potential to help industry practitioners better understand their current operations situation and generate responses to avoid fault occurrence and improve production safety.
In today's era, there are significant difficulties to identify and separate germs from an untreated blood sample or serum. Many passive separation methods are available which includes pinched flow fractionation in...
详细信息
the design, development, and deployment of scientific computing applications can be quite complex, in particular when involving Machine Learning (ML) or High-Performance Computing (HPC). they require scientific and so...
详细信息
ISBN:
(数字)9781665461245
ISBN:
(纸本)9781665461245
the design, development, and deployment of scientific computing applications can be quite complex, in particular when involving Machine Learning (ML) or High-Performance Computing (HPC). they require scientific and softwareengineering expertise and in addition HPC or ML knowledge. Often, such applications are however developed by scientists who are experts in their domain, but need support for the softwareengineering, ML, and HPC aspects. the cooperation and communication between experts from these quite different disciplines can be difficult though. We therefore propose to employ the Interaction Room (IR), a method that facilitates interdisciplinary collaboration in complex software projects. An IR uses annotated drawings to exchange information and stimulate discussion between project stakeholders, in order to improve common understanding and identify uncertainties, risks, and other aspects that are critical to a project's success early on. We suggest different drawing canvases and annotations that focus on different viewpoints and issues of the project. these canvases are specific to the project type, such as ML applications or HPC simulations.
this paper examines the predictive accuracy of four distinct models-ARIMA, ARMA, AR, and Linear Regression-applied to network traffic forecasting. through a comprehensive analysis, the ARIMA model was identified as th...
详细信息
software architectures are usually meticulously designed to address multiple quality concerns and support long-term maintenance. However, there may be a lack of motivation for developers to document design rationales ...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
software architectures are usually meticulously designed to address multiple quality concerns and support long-term maintenance. However, there may be a lack of motivation for developers to document design rationales (i.e., the design alternatives and the underlying arguments for making or rejecting decisions) when they will not gain immediate benefit, resulting in a lack of standard capture of these rationales. Withthe turnover of developers, the architecture inevitably becomes eroded. this issue has motivated a number of studies to extract design knowledge from open-source communities in recent years. Unfortunately, none of the existing research has successfully extracted solutions alone withtheir corresponding arguments due to challenges such as the intricate semantics of online discussions and the lack of benchmarks for design rationale extraction. In this paper, we propose a novel approach, named DRMiner, to automatically mine latent design rationales from developers' live discussion in open-source community (i.e., issue logs in Jira). To better identify solutions and their relevant arguments, DRMiner skillfully decomposes the problem into multiple text classification tasks and tackles them using prompt tuning of large language models (LLMs) and specific heuristic features. To evaluate DRMiner, we acquire issue logs from Cassandra, Flink, and Solr repositories in Jira and form a dataset for design rationale mining. Experimental results show that DRMiner outperforms all baselines and achieves F1 improvements of 24%, 22%, and 20% for mining design rationales, solutions, and arguments, respectively, compared to the best baseline. Furthermore, we investigate the usefulness of the design rationales mined by DRMiner for automated program repair (APR) and find that advanced LLMs, when prompted withthese extracted rationales, generate 10x-18x more full-match patches and achieve a 10%-13% gain in CodeBLEU scores.
Portable sensors are valuable tools for ultrafine particle (UFP) monitoring as they allow for real-time measurements in various environments. At the forefront of portable UFP monitoring, are lab-on-a-chip devices that...
详细信息
In this study, we introduce web-based inventory, stock monitoring, and control systems powered by a local encrypted web server. through locally secured web servers, this novel technology emphasizes data protection, ac...
详细信息
暂无评论