IEEE/ACM International Symposium on Code Generation and Optimization, CGO 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Trace-based affine reconstruction of codes

Gabriel Rodríguez, José M. Andión, Mahmut T. Kandemir, Juan Touriño

Trace-based affine reconstruction of codes

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Re-constructing high-level information for language-specific binary re-optimization

Toshihiko Koju, Reid Copeland, Motohiro Kawahito, Moriyoshi Ohara

Re-constructing high-level information for language-specific binary re-optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

NRG-loops: adjusting power from within applications

Melanie Kambadur, Martha A. Kim

NRG-loops: adjusting power from within applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Portable performance on asymmetric multicore processors

Ivan Jibaja, Ting Cao, Stephen M. Blackburn, Kathryn S. McKinley

Portable performance on asymmetric multicore processors

Details
Discussion Comments: 0
Verification: Authors have not verified information

A basic linear algebra compiler for structured matrices

Daniele G. Spampinato, Markus Püschel

A basic linear algebra compiler for structured matrices

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

IPAS: intelligent protection against silent output corruption in scientific applications

Ignacio Laguna, Martin Schulz, David F. Richards, Jon Calhoun, Luke N. Olson

IPAS: intelligent protection against silent output corruption in scientific applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Symbolic range analysis of pointers

Vitor Paisante, Maroua Maalej, Leonardo Barbosa, Laure Gonnord, Fernando Magno Quintão Pereira

Symbolic range analysis of pointers

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Communication-aware mapping of stream graphs for multi-GPU platforms

Dong Nguyen, Jongeun Lee

Communication-aware mapping of stream graphs for multi-GPU platforms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Atomicity violation checker for task parallel programs

Adarsh Yoga, Santosh Nagarakatte

Atomicity violation checker for task parallel programs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Towards automatic significance analysis for approximate computing

Vassilis Vassiliadis, Jan Riehme, Jens Deussen, Konstantinos Parasyris, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis, Uwe Naumann

Towards automatic significance analysis for approximate computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cheetah: detecting false sharing efficiently and effectively

Tongping Liu, Xu Liu

Cheetah: detecting false sharing efficiently and effectively

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flexible on-stack replacement in LLVM

Daniele Cono D'Elia, Camil Demetrescu

Flexible on-stack replacement in LLVM

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Inference of peak density of indirect branches to detect ROP attacks

Mateus Tymburibá, Rubens E. A. Moreira, Fernando Magno Quintão Pereira

Inference of peak density of indirect branches to detect ROP attacks

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Opening polyhedral compiler's black box

Lénaïc Bagnères, Oleksandr Zinenko, Stéphane Huot, Cédric Bastoul

Opening polyhedral compiler's black box

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting recent SIMD architectural advances for irregular applications

Linchuan Chen, Peng Jiang, Gagan Agrawal

Exploiting recent SIMD architectural advances for irregular applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

gpucc: an open-source GPGPU compiler

Jingyue Wu, Artem Belevich, Eli Bendersky, Mark Heffernan, Chris Leary, Jacques A. Pienaar, Bjarke Roune, Rob Springer, Xuetian Weng, Robert Hundt

gpucc: an open-source GPGPU compiler

Details
Author Comments: All relevant source code changes have been committed to llvm/clang project.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Have abstraction and eat performance, too: optimized heterogeneous computing with parallel patterns

Kevin J. Brown, HyoukJoong Lee, Tiark Rompf, Arvind K. Sujeeth, Christopher De Sa, Christopher R. Aberger, Kunle Olukotun

Have abstraction and eat performance, too: optimized heterogeneous computing with parallel patterns

Details
Discussion Comments: 0
Verification: Authors have not verified information

A black-box approach to energy-aware scheduling on integrated CPU-GPU systems

Rajkishore Barik, Naila Farooqui, Brian T. Lewis, Chunling Hu, Tatiana Shpeisman

A black-box approach to energy-aware scheduling on integrated CPU-GPU systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

AutoFDO: automatic feedback-directed optimization for warehouse-scale applications

Dehao Chen, David Xinliang Li, Tipp Moseley

AutoFDO: automatic feedback-directed optimization for warehouse-scale applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Portable and transparent software managed scheduling on accelerators for fair resource sharing

Christos Margiolas, Michael F. P. O'Boyle

Portable and transparent software managed scheduling on accelerators for fair resource sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

StructSlim: a lightweight profiler to guide structure splitting

Probir Roy, Xu Liu

StructSlim: a lightweight profiler to guide structure splitting

Details
Discussion Comments: 0
Verification: Authors have not verified information

BlackBox: lightweight security monitoring for COTS binaries

Byron Hawkins, Brian Demsky, Michael Bedford Taylor

BlackBox: lightweight security monitoring for COTS binaries

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Sparse flow-sensitive pointer analysis for multithreaded programs

Yulei Sui, Peng Di, Jingling Xue

Sparse flow-sensitive pointer analysis for multithreaded programs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Validating optimizations of concurrent C/C++ programs

Soham Chakraborty, Viktor Vafeiadis

Validating optimizations of concurrent C/C++ programs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting mixed SIMD parallelism by reducing data reorganization overhead

Hao Zhou, Jingling Xue

Exploiting mixed SIMD parallelism by reducing data reorganization overhead

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information