Using the run-time sizes of data structures to guide parallel-thread creation

Author(s):  
Lorenz Huelsbergen ◽  
James R. Larus ◽  
Alexander Aiken
Keyword(s):  
1982 ◽  
Vol 12 (4) ◽  
pp. 394-394
Author(s):  
Roger B. Dannenberg
Keyword(s):  

2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Benjamin Schiller ◽  
Clemens Deusser ◽  
Jeronimo Castrillon ◽  
Thorsten Strufe

2002 ◽  
Vol 12 (6) ◽  
pp. 567-600 ◽  
Author(s):  
KARL CRARY ◽  
STEPHANIE WEIRICH ◽  
GREG MORRISETT

Intensional polymorphism, the ability to dispatch to different routines based on types at run time, enables a variety of advanced implementation techniques for polymorphic languages, including tag-free garbage collection, unboxed function arguments, polymorphic marshalling and attened data structures. To date, languages that support intensional polymorphism have required a type-passing (as opposed to type-erasure) interpretation where types are constructed and passed to polymorphic functions at run time. Unfortunately, type-passing suffers from a number of drawbacks: it requires duplication of run-time constructs at the term and type levels, it prevents abstraction, and it severely complicates polymorphic closure conversion. We present a type-theoretic framework that supports intensional polymorphism, but avoids many of the disadvantages of type passing. In our approach, run-time type information is represented by ordinary terms. This avoids the duplication problem, allows us to recover abstraction, and avoids complications with closure conversion. In addition, our type system provides another improvement in expressiveness; it allows unknown types to be refined in place, thereby avoiding certain beta-expansions required by other frameworks.


2014 ◽  
Vol 668-669 ◽  
pp. 1198-1201
Author(s):  
Hong Mei Zhu ◽  
Liang Zhang ◽  
Wei Sun

In semantic Web, extensive reuse of existing large ontology is one of the central ideas of ontology engineering. Ontology extraction should return relative sub-ontology that covers some sub-vocabulary. The efficiency of the existing ontology extraction algorithm is relatively low when they try to get a suitable ontology module from ontology at run time. This paper proposed a kind of ontology module extraction method. Related concepts and criterions of ontology modules extraction are studied; data structures and identification and evaluation methods of ontology module extraction are discussed; preliminary experimental results and the corresponding analysis are also shown.


1994 ◽  
Vol VII (3) ◽  
pp. 79-90 ◽  
Author(s):  
Lorenz Huelsbergen ◽  
James R. Larus ◽  
Alexander Aiken
Keyword(s):  

2008 ◽  
Vol 36 (6) ◽  
pp. 592-623 ◽  
Author(s):  
H. L. A. van der Spek ◽  
S. Groot ◽  
E. M. Bakker ◽  
H. A. G. Wijshoff
Keyword(s):  

2021 ◽  
Vol 24 (2) ◽  
pp. 1-38
Author(s):  
Vincenzo Arceri ◽  
Isabella Mastroeni

Dynamic languages, such as JavaScript, employ string-to-code primitives to turn dynamically generated text into executable code at run-time. These features make standard static analysis extremely hard if not impossible, because its essential data structures, i.e., the control-flow graph and the system of recursive equations associated with the program to analyze, are themselves dynamically mutating objects. Nevertheless, assembling code at run-time by manipulating strings, such as by eval in JavaScript, has been always strongly discouraged, since it is often recognized that “ eval is evil ,” leading static analyzers to not consider such statements or ignoring their effects. Unfortunately, the lack of formal approaches to analyze string-to-code statements pose a perfect habitat for malicious code, that is surely evil and do not respect good practice rules, allowing them to hide malicious intents as strings to be converted to code and making static analyses blind to the real malicious aim of the code. Hence, the need to handle string-to-code statements approximating what they can execute, and therefore allowing the analysis to continue (even in the presence of dynamically generated program statements) with an acceptable degree of precision, should be clear. To reach this goal, we propose a static analysis allowing us to collect string values and to soundly over-approximate and analyze the code potentially executed by a string-to-code statement.


Sign in / Sign up

Export Citation Format

Share Document