Optimizations, a critical element within the compiler pipeline, is responsible for improving the efficiency of generated code. In this paper, we take a different angle to evaluate compiler optimizations than all exist...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Optimizations, a critical element within the compiler pipeline, is responsible for improving the efficiency of generated code. In this paper, we take a different angle to evaluate compiler optimizations than all existing works in compiler testing literature. In particular, we consider a specific scenario in software development, that is, when developers manually optimize a program to improve its performance, do compilers actually generate more efficient code with the help of developers' optimizations? To answer this question, we develop a simple approach which consists of (1) transforming a program into the same or less efficient version of the original program, and then (2) comparing the performance of the generated code from each version of the source code. Consequently, the original program can be treated as an optimized version of the transformed program. We use the approach to evaluate GCC and LLVM, two industry compilers, and observe that the extra optimizations presented in the original programs can be not only unhelpful, but more seriously counterproductive to both GCC and LLVM, resulting in the less efficient code generated overall. Out of our evaluation results, we summarized and reported 53 LLVM and 18 GCC defects, out of which 37 and 17 have been confirmed or fixed.
Diabetes is a category of metabolic disease caused by a prolonged high blood sugar level. It is sometimes referred to as a chronic disease. If accurate early prediction is achievable, it can considerably lower the ris...
详细信息
With the development of digital media technology, the security and copyright protection of media files have become particularly important. This article proposes an encrypted digital watermark technology based on HTML5...
详细信息
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an...
详细信息
There has been a continued transmission of malaria throughout the world due to protozoan parasites from the Plasmodium species. As for treatment and control, it is very important to make correct and more efficient dia...
详细信息
Sentence with polysemous words can easily be interpreted as different meanings by different people even in a specific context, which will significantly reduce the quality of requirements documents. However, existing a...
详细信息
The course Introduction to computer Networks (ICN) has become one of the most vital courses in computerscience and softwareengineering degrees and clearly is an imperative course for a degree in computer networking....
详细信息
By applying the fish swarm algorithm to the generation of the multicast tree under the dynamic satellite network, a method for generating the multicast tree with good adaptability and inheritance was found, and the ge...
详细信息
To empower smart contracts with the promising capabilities of cryptography, Ethereum officially introduced a set of cryptographic APIs that facilitate basic cryptographic operations within smart contracts, such as ell...
详细信息
An intrusion Detection system is a software that monitors the network traffic and alerts the administrators if any malicious request is found. The system is able to segregate between a malicious and non-malicious requ...
详细信息
暂无评论