You are currently on the new version of our website. Access the old version .

601 Results Found

  • Article
  • Open Access
10 Citations
4,644 Views
26 Pages

Iterative compilation based on machine learning can effectively predict a program’s compiler optimization parameters. Although having some limits, such as the low efficiency of optimization parameter search and prediction accuracy, machine lear...

  • Communication
  • Open Access
3 Citations
3,769 Views
10 Pages

Co-optimization for memory bank compilation and placement was suggested as a way to improve performance and power and reduce the size of a memory subsystem. First, a multi-configuration SRAM compiler was realized that could generate memory banks with...

  • Article
  • Open Access
3 Citations
8,275 Views
19 Pages

Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices

  • Pedro Malagón,
  • Juan-Mariano De Goyeneche,
  • Marina Zapater,
  • José M. Moya and
  • Zorana Banković

8 June 2012

Ambient Intelligence (AmI) requires devices everywhere, dynamic and massively distributed networks of low-cost nodes that, among other data, manage private information or control restricted operations. MSP430, a 16-bit microcontroller, is used in WSN...

  • Article
  • Open Access
7 Citations
8,065 Views
13 Pages

2 April 2012

The VLIW architecture can be exploited to greatly enhance instruction level parallelism, thus it can provide computation power and energy efficiency advantages, which satisfies the requirements of future sensor-based systems. However, as VLIW codes a...

  • Article
  • Open Access
1 Citations
3,776 Views
19 Pages

2 September 2022

Compilation often takes a long time, especially for large projects or when identifying better optimization options. Currently, compilers are mainly installed on local machines and used as standalone software. Despite the availability of several onlin...

  • Article
  • Open Access
2,049 Views
23 Pages

23 February 2024

Many different aspects of software system development and verification rely on precise function identification in binary code. Recognition of the source Assembly functions in embedded systems is one of the fundamental challenges in binary program ana...

  • Article
  • Open Access
753 Views
17 Pages

29 August 2025

Deep learning has emerged as a prominent focus in both academia and industry, with a wide range of models being applied across diverse domains. Fast and efficient model inference is essential for the practical deployment of deep learning models. Unde...

  • Article
  • Open Access
876 Views
20 Pages

30 July 2025

Compiler optimization is a critical component for improving program performance. However, the Rustc optimization process may introduce vulnerabilities due to algorithmic flaws or issues arising from component interactions. Existing testing methods fa...

  • Article
  • Open Access
18 Citations
5,457 Views
30 Pages

29 June 2022

In recent years, convolutional neural network (CNN)-based algorithms have been widely used in remote sensing image processing and show tremendous performance in a variety of application fields. However, large amounts of data and intensive computation...

  • Article
  • Open Access
4 Citations
1,579 Views
14 Pages

24 August 2023

In this article, we analyze the program codes generated automatically using three advanced optimizers: Pluto, Traco, and Dapt, which are specifically tailored for the NPDP benchmark set. This benchmark set comprises ten program loops, predominantly f...

  • Article
  • Open Access
1 Citations
1,508 Views
24 Pages

ReRAM-based DNN accelerators have emerged as a promising solution to mitigate the von Neumann bottleneck. While prior research has introduced tools for simulating the hardware behavior of ReRAM’s non-linear characteristics, there remains a nota...

  • Article
  • Open Access
12 Citations
5,502 Views
21 Pages

15 February 2022

In recent years, the number of smart contracts running in the blockchain has increased rapidly, accompanied by many security problems, such as vulnerability propagation caused by code reuse or vicious transaction caused by malicious contract deployme...

  • Article
  • Open Access
1 Citations
1,988 Views
29 Pages

Representing Integer Sequences Using Piecewise-Affine Loops

  • Gabriel Rodríguez,
  • Louis-Noël Pouchet and
  • Juan Touriño

24 September 2021

A formal, high-level representation of programs is typically needed for static and dynamic analyses performed by compilers. However, the source code of target applications is not always available in an analyzable form, e.g., to protect intellectual p...

  • Article
  • Open Access
20 Citations
5,205 Views
20 Pages

8 October 2021

Several tools and pieces of software support building energy modelling for optimization, certification and comparisons of different scenarios and usages. Nevertheless, the consistent rise in accessible computational power and the expansion of ICT are...

  • Feature Paper
  • Review
  • Open Access
22 Citations
7,139 Views
31 Pages

Due to the amount of data involved in emerging deep learning and big data applications, operations related to data movement have quickly become a bottleneck. Data-centric computing (DCC), as enabled by processing-in-memory (PIM) and near-memory proce...

  • Article
  • Open Access
3 Citations
2,851 Views
22 Pages

Space-Time Loop Tiling for Dynamic Programming Codes

  • Wlodzimierz Bielecki and
  • Marek Palkowski

12 September 2021

We present a new space-time loop tiling approach and demonstrate its application for the generation of parallel tiled code of enhanced locality for three dynamic programming algorithms. The technique envisages that, for each loop nest statement, sub-...

  • Article
  • Open Access
40 Citations
8,265 Views
20 Pages

Efficient Decomposition of Unitary Matrices in Quantum Circuit Compilers

  • Anna M. Krol,
  • Aritra Sarkar,
  • Imran Ashraf,
  • Zaid Al-Ars and
  • Koen Bertels

12 January 2022

Unitary decomposition is a widely used method to map quantum algorithms to an arbitrary set of quantum gates. Efficient implementation of this decomposition allows for the translation of bigger unitary gates into elementary quantum operations, which...

  • Article
  • Open Access
1 Citations
2,173 Views
14 Pages

23 September 2023

Low-Level Virtual Machine (LLVM) compiler infrastructure is a useful tool for building just-in-time (JIT) compilers, besides its reliable front end represented by a clang compiler and its elaborated middle end containing different optimizations that...

  • Article
  • Open Access
4 Citations
2,634 Views
17 Pages

Quantum Circuit Template Matching Optimization Method for Constrained Connectivity

  • Xiaofeng Gao,
  • Zhijin Guan,
  • Shiguang Feng and
  • Yibo Jiang

14 July 2023

The execution of quantum algorithms requires two key considerations. On the one hand, it should meet the connectivity constraint requirements of quantum circuit mapping for quantum architectures, and on the other hand, it needs to consider reducing t...

  • Article
  • Open Access
4 Citations
2,513 Views
28 Pages

CHiPReP—A Compiler for the HiPReP High-Performance Reconfigurable Processor

  • Markus Weinhardt,
  • Mohamed Messelka and
  • Philipp Käsgen

23 October 2021

This article presents CHiPReP, a C compiler for the HiPReP processor, which is a high-performance Coarse-Grained Reconfigurable Array employing Floating-Point Units. CHiPReP is an extension of the LLVM and CCF compiler frameworks. Its main contributi...

  • Article
  • Open Access
1 Citations
1,685 Views
21 Pages

In the landscape of software development, the selection of compilation tools and settings plays a pivotal role in the creation of executable binaries. This diversity, while beneficial, introduces significant challenges for reverse engineers and secur...

  • Article
  • Open Access
5 Citations
3,341 Views
16 Pages

A Fast Approach for Generating Efficient Parsers on FPGAs

  • Zhuang Cao,
  • Huiguo Zhang,
  • Junnan Li,
  • Mei Wen and
  • Chunyuan Zhang

10 October 2019

The development of modern networking requires that high-performance network processors be designed quickly and efficiently to support new protocols. As a very important part of the processor, the parser parses the headers of the packets—this is...

  • Article
  • Open Access
1 Citations
1,983 Views
37 Pages

Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction

  • Fahad Alqurashi,
  • Muhammad Al-Hashimi,
  • Mostafa Saleh and
  • Osama Abulnaja

16 February 2025

Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study pre...

  • Article
  • Open Access
8 Citations
4,211 Views
22 Pages

Automatic and Interactive Program Parallelization Using the Cetus Source to Source Compiler Infrastructure v2.0

  • Akshay Bhosale,
  • Parinaz Barakhshan,
  • Miguel Romero Rosas and
  • Rudolf Eigenmann

This paper presents an overview and evaluation of the existing and newly added analysis and transformation techniques in the Cetus source-to-source compiler infrastructure. Cetus is used for research on compiler optimizations for multi-cores with an...

  • Article
  • Open Access
3,258 Views
18 Pages

On the Transformation Optimization for Stencil Computation

  • Huayou Su,
  • Kaifang Zhang and
  • Songzhu Mei

Stencil computation optimizations have been investigated quite a lot, and various approaches have been proposed. Loop transformation is a vital kind of optimization in modern production compilers and has proved successful employment within compilers....

  • Article
  • Open Access
2,275 Views
13 Pages

18 October 2021

As an important condition for fatigue analysis and life prediction, load spectrum is widely used in various engineering fields. The extrapolation of load samples is an important step in compiling load spectrum. It is of great significance to select a...

  • Article
  • Open Access
1 Citations
5,297 Views
20 Pages

Dense Matrix Multiplication Algorithms and Performance Evaluation of HPCC in 81 Nodes IBM Power 8 Architecture

  • Eduardo Patricio Estévez Ruiz,
  • Giovanny Eduardo Caluña Chicaiza,
  • Fabian Rodolfo Jiménez Patiño,
  • Joaquín Cayetano López Lago and
  • Saravana Prakash Thirumuruganandham

Optimizing HPC systems based on performance factors and bottlenecks is essential for designing an HPC infrastructure with the best characteristics and at a reasonable cost. Such insight can only be achieved through a detailed analysis of existing HPC...

  • Feature Paper
  • Article
  • Open Access
39 Citations
6,902 Views
15 Pages

Early Prediction of Chronic Kidney Disease: A Comprehensive Performance Analysis of Deep Learning Models

  • Chaity Mondol,
  • F. M. Javed Mehedi Shamrat,
  • Md. Robiul Hasan,
  • Saidul Alam,
  • Pronab Ghosh,
  • Zarrin Tasnim,
  • Kawsar Ahmed,
  • Francis M. Bui and
  • Sobhy M. Ibrahim

29 August 2022

Chronic kidney disease (CKD) is one of the most life-threatening disorders. To improve survivability, early discovery and good management are encouraged. In this paper, CKD was diagnosed using multiple optimized neural networks against traditional ne...

  • Article
  • Open Access
17 Citations
2,288 Views
20 Pages

To obtain the load spectrum of the traction resistance of the three-point suspension device under tractor-plowing conditions, a load spectrum extrapolation method based on a genetic algorithm optimal threshold selection is proposed. This article firs...

  • Article
  • Open Access
11 Citations
4,520 Views
15 Pages

27 September 2020

An asset allocation optimization model for key clients and financial products is developed and deployed on a business platform by compiling a program to a module using MATLAB to show how to integrate financial big data and fintech in a real applicati...

  • Article
  • Open Access
7 Citations
3,109 Views
18 Pages

Load Spectrum Compilation Method of Hybrid Electric Vehicle Reducers Based on Multi-Criteria Decision Making

  • Jie Li,
  • Chongyang Han,
  • Weibin Wu,
  • Ting Tang,
  • Xiao Ran,
  • Zefeng Zheng and
  • Shunli Sun

30 April 2022

This article proposes a method for compiling the load spectra of reducers for hybrid electric vehicles. Selecting typical working conditions for real vehicle data collection, the load data under each typical working condition were divided into five c...

  • Article
  • Open Access
568 Views
23 Pages

Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information. Homomorphic encryption allows computations on encr...

  • Article
  • Open Access
8 Citations
2,626 Views
17 Pages

Comparative Analysis, Use Recommendations, and Application Cases of Methods for Develop Ship Emission Inventories

  • Yue Li,
  • Yonglin Zhang,
  • Jinxiang Cheng,
  • Chaohui Zheng,
  • Mingjun Li,
  • Honglei Xu,
  • Renjie Wang,
  • Dongsheng Chen,
  • Xiaotong Wang and
  • Lan Shi
  • + 4 authors

3 August 2022

Ship exhaust emissions have been considered as a significant source of air pollution that has an adverse impact on the global climate and human health. It is of vital importance to create an accurate ship emission inventory for the purpose of formula...

  • Article
  • Open Access
4 Citations
3,798 Views
16 Pages

8 October 2023

The Global Health Security Index (GHSI), the first report on the world’s defensive capabilities against major infectious diseases, released in 2019, deviated from the actual performance of countries globally during COVID-19. Principal component...

  • Article
  • Open Access
6 Citations
3,105 Views
14 Pages

Designing automatic optimizing compilers is an advanced engineering process requiring a great deal of expertise, programming, testing, and experimentation. Maintaining the approach and adapting it to evolving libraries and environments is a time-cons...

  • Article
  • Open Access
5 Citations
6,354 Views
18 Pages

28 July 2021

This paper deals with the design and implementation of cross-platform, D2Q9-BGK and D3Q27-MRT, lattice Boltzmann method solver for 2D and 3D flows developed with ArrayFire library for high-performance computing. The solver leverages ArrayFire’s just-...

  • Article
  • Open Access
29 Citations
8,584 Views
28 Pages

Estimation of Grey-Box Dynamic Model of 2-DOF Pneumatic Actuator Robotic Arm Using Gravity Tests

  • Monika Trojanová,
  • Tomáš Čakurda,
  • Alexander Hošovský and
  • Tibor Krenický

14 May 2021

This article describes the dynamics of a manipulator with two degrees of freedom, while the dynamic model of the manipulator’s arm is derived using Lagrangian formalism, which considers the difference between the kinetic and potential energy of the s...

  • Review
  • Open Access
1 Citations
4,904 Views
19 Pages

3 December 2018

The paper presents a Non-Uniform Memory Access (NUMA)-aware compiler optimization for task-level parallel code. The optimization is based on Non-Uniform Memory Access—Balanced Task and Loop Parallelism (NUMA-BTLP) algorithm Ştirb, 2018. The alg...

  • Article
  • Open Access
28 Citations
4,322 Views
21 Pages

10 August 2019

Code reuse is widespread in software development as well as internet of things (IoT) devices. However, code reuse introduces many problems, e.g., software plagiarism and known vulnerabilities. Solving these problems requires extensive manual reverse...

  • Article
  • Open Access
2 Citations
1,820 Views
22 Pages

30 April 2025

With the continuous growth of network traffic scale, traditional software-based intrusion detection systems (IDS) constrained by CPU-processing capabilities struggle to meet the requirements of 100 Gbps high-speed network environments. While existing...

  • Article
  • Open Access
907 Views
13 Pages

Online laboratories have emerged as a viable alternative for providing hands-on experience to engineering students, especially in fields related to computer, software, and electrical engineering. In particular, remote laboratories enable users to int...

  • Article
  • Open Access
4,850 Views
16 Pages

19 February 2025

In smart contract fuzz testing, it is crucial to consider the inter-dependencies between the contract functions. To effectively test the business logic of a contract, its functions must be invoked in a meaningful order. In this paper, we propose tech...

  • Article
  • Open Access
6 Citations
3,376 Views
14 Pages

Sub-National Scale Initiatives for Climate Change Mitigation: Refining the Approach to Increase the Effectiveness of the Covenant of Mayors

  • Fabio Sporchia,
  • Michela Marchi,
  • Enrico Nocentini,
  • Nadia Marchettini and
  • Federico Maria Pulselli

21 December 2022

Climate change mitigation strategies include sub-national initiatives proposed and operated by municipalities. An example of such initiatives is the Covenant of Mayors, the signatories of which are requested to compile territorial greenhouse gas emis...

  • Article
  • Open Access
975 Views
24 Pages

25 May 2025

The compiler serves as a bridge connecting hardware architecture and application software, converting source code into executable files and optimizing code. Fuzz testing is an automated testing technology that evaluates software reliability by provid...

  • Article
  • Open Access
1 Citations
3,609 Views
20 Pages

An Optimization Framework for Codes Classification and Performance Evaluation of RISC Microprocessors

  • Syed Rameez Naqvi,
  • Ali Roman,
  • Tallha Akram,
  • Majed M. Alhaisoni,
  • Muhammad Naeem,
  • Sajjad Ali Haider,
  • Omer Chughtai and
  • Muhammad Awais

19 July 2019

Pipelines, in Reduced Instruction Set Computer (RISC) microprocessors, are expected to provide increased throughputs in most cases. However, there are a few instructions, and therefore entire assembly language codes, that execute faster and hazard-fr...

  • Article
  • Open Access
18 Citations
5,281 Views
17 Pages

13 March 2020

This paper discusses the solutions for topology optimization of spatially discrete structures. The optimization objects are the structural weight and the maximum displacement. The optimization variables include structural node coordinates, and the im...

  • Article
  • Open Access
2 Citations
1,382 Views
19 Pages

7 September 2025

During the working process of the wheel loader, the repeated cycle of the shoveling and unloading process will produce an impact, so the loader is under a cyclic load for a long time, which leads to the frequent failure of its main parts. In this stu...

of 13