Exploiting symmetries for optimal integrated code generation

被引:0
|
作者
Bednarski, A [1 ]
Kessler, C [1 ]
机构
[1] Linkoping Univ, Dept Comp Sci, PELAB, S-58183 Linkoping, Sweden
关键词
optimization; code generation; symmetry; subgraph; isomorphism;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High quality code generation for irregular architectures, such as Digital Signal Processors, is a complex task, as it requires a fully integrated approach that simultaneously deals with the most important tasks of instruction selection, register allocation and instruction scheduling. We show how a fully integrated approach for optimal code generation based on dynamic programming can benefit from exploiting symmetry properties of dependence graphs that decrease the combinatorial explosion of the solution space. We identify conditions when it suffices to explore only one of multiple possible branches that would lead to equivalent results with respect to code quality.
引用
收藏
页码:83 / 89
页数:7
相关论文
共 50 条
  • [41] Exploiting Symmetries of Distributions in CNNs and Folded Coding
    Marvasti, Ehsan Emad
    Marvasti, Amir Emad
    Foroosh, Hassan
    2018 15TH CONFERENCE ON COMPUTER AND ROBOT VISION (CRV), 2018, : 47 - 54
  • [42] Exploiting Epochs and Symmetries in Analysing MPI Programs
    Ranjan, Rishabh
    Agrawal, Ishita
    Sharma, Subodh
    PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
  • [43] Exploiting symmetries for testing equivalence in the Spi calculus
    Cibrario, I
    Durante, L
    Sisto, R
    Valenzano, A
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 135 - 149
  • [44] Symmetries, almost symmetries, and lazy clause generation
    Chu, Geoffrey
    de la Banda, Maria Garcia
    Mears, Christopher
    Stuckey, Peter J.
    CONSTRAINTS, 2014, 19 (04) : 434 - 462
  • [45] Optimal Beamforming for Secure Integrated Sensing and Communication Exploiting Target Location Distribution
    Hou, Kaiyue
    Zhang, Shuowen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2024, 42 (11) : 3125 - 3139
  • [46] Symmetries, almost symmetries, and lazy clause generation
    Geoffrey Chu
    Maria Garcia de la Banda
    Christopher Mears
    Peter J. Stuckey
    Constraints, 2014, 19 : 434 - 462
  • [47] Exploiting Code Redundancies in ECOC
    Park, Sang-Hyeun
    Weizsaecker, Lorenz
    Fuernkranz, Johannes
    DISCOVERY SCIENCE, DS 2010, 2010, 6332 : 266 - 280
  • [48] On exploiting channel code redundancy
    Hogan, J
    ODS - 1997 OPTICAL DATA STORAGE TOPICAL MEETING, CONFERENCE DIGEST, 1997, : 38 - 39
  • [49] Exploiting modulation code redundancy
    Hogan, J
    OPTICAL DATA STORAGE '97, 1997, 3109 : 88 - 94
  • [50] Exploiting Code Diversity to Enhance Code Virtualization Protection
    Xue, Chao
    Tang, Zhanyong
    Ye, Guixin
    Li, Guanghui
    Gong, Xiaoqing
    Wangg, Wei
    Fang, Dingyi
    Wang, Zheng
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 620 - 627