A Framework for Install - Time Optimization of Binary Dynamic - Link

نویسندگان

  • CHRISTOPHER NEITH GEORGE
  • John Gyllenhaal
چکیده

ACKNOWLEDGMENTS The work described in this thesis has undergone many evolutions and owes many debts to many people. I w ould like to thank my advisor, Professor Wen-mei Hwu, for his teaching and advice and for giving me a chance to prove that I could get the job done. John Gyllenhaal was a source of much advice and a fountain of valuable information regarding the machine description language and the IMPACT schedule manager. Matthew Merten and I have been working side-by-side on this project for the past year and a half, and he has been a tremendous help in working through ideas, debugging my code, and doing anything else humanly possible to see that the project continued. Matt developed the instruction conversion to Mcode in the x86toM module and has done the work to incorporate object les into the framework. Mike Thiems helped to develop much o f t h e framework and worked extensively on the optimizations and binary code generation in the Lbx86 module. The decoding framework and PEwrite code were developed in the initial phase of the project with John Sias, Guanyao Cheng, and myself, and John was an excellent mentor. Thanks to all of the members of the IMPACT group and AMD's Advanced Architecture Labs for their technical guidance. Special thanks go to my family for all the years of support and encouragement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Adapting Population-Based and Heuristic Algorithms for Dynamic Optimization Problems

In this paper, a general framework was presented to boost heuristic optimization algorithms based on swarm intelligence from static to dynamic environments. Regarding the problems of dynamic optimization as opposed to static environments, evaluation function or constraints change in the time and hence place of optimization. The subject matter of the framework is based on the variability of the ...

متن کامل

Encouraging household investors to install distribution level battery storage systems using incentive prices

In this paper a bi-level optimization approach is introduced to increase the participation of household investors to install battery storage systems in the distribution level. The incentive prices are used here to encourage the private investor. In the upper level the viewpoint of the government is modeled in which, the peak shaving is the goal while minimizing the cost due to the allocated sub...

متن کامل

An Optimization Model for Epidemic Mitigation and Some Theoretical and Applied Generalizations

In this paper, we present a binary-linear optimization model to prevent the spread of an infectious disease in a community. The model is based on the remotion of some connections in a contact network in order to separate infected nodes from the others. By using this model we nd an exact optimal solution and determine not only the minimum number of deleted links but also their exact positions. T...

متن کامل

Alternative ranking method in Dynamic Data Envelopment Analysis (DDEA)

The motivation of this paper is to propose such equitable method for ranking all decision making units (DMUs) in dynamic Data Envelopment Analysis (DDEA) framework. As far as we are aware there is not more studies in dynamic DEA literature. What's more, in such cases the best operating unit is important to be sampled for the others in under evaluated time periods. However, in this special conce...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999