We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse value-flow analysis for leak detection. S...
详细信息
Compilers are traditionally factorised into a number of separate phases, such as parsing, type checking, code generation, etc. However, there is another potential factorisation that has received comparatively little a...
详细信息
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are...
详细信息
The goal of Partitioned Global Address Space (PGAS) languages is to improve programmer productivity in large scale parallel machines. However, PGAS programs may have many fine-grained shared accesses that lead to perf...
详细信息
Networking Technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, ...
详细信息
A number of popular engineering processes and methodologies emerged over the past years which attracted interest in research and industry. For process enactment, enterprises have to match requirements of engineering p...
详细信息
ISBN:
(纸本)9789898565105
A number of popular engineering processes and methodologies emerged over the past years which attracted interest in research and industry. For process enactment, enterprises have to match requirements of engineering processes with existing resources. Therefore, it has to be analyzed if employees have sufficient skills or if infrastructure has sufficient capabilities to match the requirements of a situational process. Both, maintaining a skill and resource database and matching requirements against this database are an enormously challenging and time-consuming task. Additionally, this matching has to be carried out regularly as employees join and leave the company and skills change over time. Based upon a formal, logical base, we present an approach that combines ontological and metamodeling technical spaces and enables an automatic analysis of engineering processes regarding the existence of necessary resources.
When moving to a Type Theory without proof-irrelevance the notion of a setoid has to be generalized to the notion of a weak ω-groupoid. As a first step in this direction we study the formalisation of weak ω-groupoid...
详细信息
Let there be given a safety related electronic system suffering from random failures or errors. The standard IEC 61508 contains simplified equations for the probability of failure on demand PFDavg for special system a...
详细信息
ISBN:
(纸本)9781622764365
Let there be given a safety related electronic system suffering from random failures or errors. The standard IEC 61508 contains simplified equations for the probability of failure on demand PFDavg for special system architectures, mostly without proof. In various publications PFDavg is defined by several different equations, e.g. as a Laplacian probability, as an integral mean, or by means of the average failure rate of the system. The aim of the paper is to determine PFDavgby stochastic methods and to bring together the different definitions. A formula for PFDavg is given that is valid for most universal electronic systems. The equivalence of 2 different definitions of PFDavgis shown. The special case of a koon-System is investigated, and the resulting equations improve those known so far. The basic idea is to randomize the time to failure, the down time of the system, as well as the repair time, and then, by means of the Stieltjes-Integral, determine the mean or average time as the expectation of the respective random variable.
The present paper deals with the quantitative analysis of the safety-related systems. The configuration of such safety-related system is composed of channels that include both detectable and undetectable failures. It ...
详细信息
ISBN:
(纸本)9781622764365
The present paper deals with the quantitative analysis of the safety-related systems. The configuration of such safety-related system is composed of channels that include both detectable and undetectable failures. It also deals with a possible calculating model of a safety-intrusion and their consequences on the safety-related system, but it is also important to note at this point that information and experimental results for this model with real data are not (public) available yet. This model should clearly demonstrate the possible calculation of safety-intrusion model, based on high reliable architecture, with the help of Markov models.
In this paper, we present a hybrid circular queue method that can significantly boost the performance of stencil computations on GPU by carefully balancing usage of registers and shared-memory. Unlike earlier methods ...
详细信息
In this paper, we present a hybrid circular queue method that can significantly boost the performance of stencil computations on GPU by carefully balancing usage of registers and shared-memory. Unlike earlier methods that rely on circular queues predominantly implemented using indirectly addressable shared memory, our hybrid method exploits a new reuse pattern spanning across the multiple time steps in stencil computations so that circular queues can be implemented by both shared memory and registers effectively in a balanced manner. We describe a framework that automatically finds the best placement of data in registers and shared memory in order to maximize the performance of stencil computations. Validation using four different types of stencils on three different GPU platforms shows that our hybrid method achieves speedups up to 2.93X over methods that use circular queues implemented with shared-memory only.
暂无评论