IEEE/ACM International Symposium on Code Generation and Optimization, CGO 2018


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Synthesizing programs that expose performance bottlenecks

Luca Della Toffola, Michael Pradel, Thomas R. Gross

Synthesizing programs that expose performance bottlenecks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The generalized matrix chain algorithm

Henrik Barthels, Marcin Copik, Paolo Bientinesi

The generalized matrix chain algorithm

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Local memory-aware kernel perforation

Daniel Maier, Biagio Cosenza, Ben H. H. Juurlink

Local memory-aware kernel perforation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Transforming loop chains via macro dataflow graphs

Eddie C. Davis, Michelle Mills Strout, Catherine Olschanowsky

Transforming loop chains via macro dataflow graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lightweight detection of cache conflicts

Probir Roy, Shuaiwen Leon Song, Sriram Krishnamoorthy, Xu Liu

Lightweight detection of cache conflicts

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Dominance-based duplication simulation (DBDS): code duplication to enable compiler optimizations

David Leopoldseder, Lukas Stadler, Thomas Würthinger, Josef Eisl, Doug Simon, Hanspeter Mössenböck

Dominance-based duplication simulation (DBDS): code duplication to enable compiler optimizations

Details
Discussion Comments: 0
Verification: Authors have not verified information

A compiler for cyber-physical digital microfluidic biochips

Christopher Curtis, Daniel T. Grissom, Philip Brisk

A compiler for cyber-physical digital microfluidic biochips

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

AutoPA: automatically generating active driver from original passive driver code

Jia-Ju Bai, Yu-Ping Wang, Shi-Min Hu

AutoPA: automatically generating active driver from original passive driver code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Synthesizing an instruction selection rule library from semantic specifications

Sebastian Buchwald, Andreas Fried, Sebastian Hack

Synthesizing an instruction selection rule library from semantic specifications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Register allocation for Intel processor graphics

Wei-Yu Chen, Guei-Yuan Lueh, Pratik Ashar, Kaiyu Chen, Buqi Cheng

Register allocation for Intel processor graphics

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Scalable concurrency debugging with distributed graph processing

Long Zheng, Xiaofei Liao, Hai Jin, Jieshan Zhao, Qinggang Wang

Scalable concurrency debugging with distributed graph processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

nAdroid: statically detecting ordering violations in Android applications

Xinwei Fu, Dongyoon Lee, Changhee Jung

nAdroid: statically detecting ordering violations in Android applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

High performance stencil code generation with lift

Bastian Hagedorn, Larisa Stoltzfus, Michel Steuwer, Sergei Gorlatch, Christophe Dubach

High performance stencil code generation with lift

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Loop transformations leveraging hardware prefetching

Savvas Sioutas, Sander Stuijk, Henk Corporaal, Twan Basten, Lou J. Somers

Loop transformations leveraging hardware prefetching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analyzing and optimizing task granularity on the JVM

Andrea Rosà, Eduardo Rosales, Walter Binder

Analyzing and optimizing task granularity on the JVM

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SGXElide: enabling enclave code secrecy via self-modification

Erick Bauman, Huibo Wang, Mingwei Zhang, Zhiqiang Lin

SGXElide: enabling enclave code secrecy via self-modification

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

CVR: efficient vectorization of SpMV on x86 processors

Biwei Xie, Jianfeng Zhan, Xu Liu, Wanling Gao, Zhen Jia, Xiwen He, Lixin Zhang

CVR: efficient vectorization of SpMV on x86 processors

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Look-ahead SLP: auto-vectorization in the presence of commutative operations

Vasileios Porpodas, Rodrigo C. O. Rocha, Luís F. W. Góes

Look-ahead SLP: auto-vectorization in the presence of commutative operations

Details
Discussion Comments: 0
Verification: Authors have not verified information

May-happen-in-parallel analysis with static vector clocks

Qing Zhou, Lian Li, Lei Wang, Jingling Xue, Xiaobing Feng

May-happen-in-parallel analysis with static vector clocks

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Program generation for small-scale linear algebra applications

Daniele G. Spampinato, Diego Fabregat-Traver, Paolo Bientinesi, Markus Püschel

Program generation for small-scale linear algebra applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

CollectionSwitch: a framework for efficient and dynamic collection selection

Diego Costa, Artur Andrzejak

CollectionSwitch: a framework for efficient and dynamic collection selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Conflict-free vectorization of associative irregular applications with recent SIMD architectural advances

Peng Jiang, Gagan Agrawal

Conflict-free vectorization of associative irregular applications with recent SIMD architectural advances

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DeLICM: scalar dependence removal at zero memory cost

Michael Kruse, Tobias Grosser

DeLICM: scalar dependence removal at zero memory cost

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Qubit allocation

Marcos Yukio Siraichi, Vinícius Fernandes dos Santos, Sylvain Collange, Fernando Magno Quintão Pereira

Qubit allocation

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Optimal DNN primitive selection with partitioned boolean quadratic programming

Andrew Anderson, David Gregg

Optimal DNN primitive selection with partitioned boolean quadratic programming

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

SIMD intrinsics on managed language runtimes

Alen Stojanov, Ivaylo Toskov, Tiark Rompf, Markus Püschel

SIMD intrinsics on managed language runtimes

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Resilient decentralized Android application repackaging detection using logic bombs

Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li

Resilient decentralized Android application repackaging detection using logic bombs

Details
Discussion Comments: 0
Verification: Authors have not verified information

CUDAAdvisor: LLVM-based runtime profiling for modern GPUs

Du Shen, Shuaiwen Leon Song, Ang Li, Xu Liu

CUDAAdvisor: LLVM-based runtime profiling for modern GPUs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Poker: permutation-based SIMD execution of intensive tree search by path encoding

Feng Zhang, Jingling Xue

Poker: permutation-based SIMD execution of intensive tree search by path encoding

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Automating efficient variable-grained resiliency for low-power IoT systems

Sara S. Baghsorkhi, Christos Margiolas

Automating efficient variable-grained resiliency for low-power IoT systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Biological computation (keynote)

Sara-Jane Dunn

Biological computation (keynote)

Details
Discussion Comments: 0
Verification: Author has not verified information