Optimizing System Performance and Dependability Using Compiler Techniques

نویسنده

  • Mohan Rajagopalan
چکیده

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 CHAPTER 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.1 System Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.2 Current Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 1.3 Holistic System Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 1.3.1 The holistic approach . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 1.3.2 Cassyopia: A framework for holistic optimization . . . . . . . . . . . 21 1.4 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 CHAPTER 2: Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.1 Compiler Optimizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.1.1 Basic classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.1.2 Feedback-directed approaches . . . . . . . . . . . . . . . . . . . . . . 28 2.1.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.2 Systems Optimizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.2.1 Basic classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.2.2 Customization-based approaches . . . . . . . . . . . . . . . . . . . . . 32 2.2.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 2.3 Broader Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 2.3.1 Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 2.3.2 Synthetix and Compose . . . . . . . . . . . . . . . . . . . . . . . . . . 39 2.3.3 SPIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 2.3.4 Infokernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 2.3.5 Singularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cassyopia: Compiler Assisted System Optimization

Execution of a program almost always involves multiple address spaces, possibly across separate machines. Here, an approach to reducing such costs using compiler optimization techniques is presented. This paper elaborates on the overall vision, and as a concrete example, describes how this compiler assisted approach can be applied to the optimization of system call performance on a single host....

متن کامل

Marmot: an optimizing compiler for Java

The Marmot system is a research platform for studying the implementation of high level programming languages. It currently comprises an optimizing native-code compiler, runtime system, and libraries for a large subset of Java. Marmot integrates well-known representation, optimization, code generation, and runtime techniques with a few Java-specific features to achieve competitive performance. T...

متن کامل

Compiler Optimization Techniques for Improving Distributed Object Computing Framework Performance over High-speed ATM Networks

This paper demonstrates why the performance of flexible Distributed Object Computing (DOC) frameworks, such as the Common Object Request Broker Architecture (CORBA), must be improved to satisfy the requirements of nextgeneration bandwidth-intensive and delay-sensitive applications. In addition, the paper outlines a software toolkit we are building to integrate various compiler optimization tech...

متن کامل

A Self-Optimization Method for System Service Dependability based on Autonomic Computing

Under the intrusion or abnormal attacks, how to supply system service dependability autonomously, without being degraded, is the essential requirement to network system service. Autonomic Computing can overcome the heterogeneity and complexity of computing system, has been regarded as a novel and effective approach to implementing autonomous systems to address system security issues. To cope wi...

متن کامل

Compiler-Enforced Memory Semantics in the SACLIB Computer Algebra Library

Compiler-Enforced Memory Semantics in the SACLIB Computer Algebra Library David G. Richardson Advisor: Werner Krandick We present a memory management subsystem for the computer algebra library SACLIB that removes the potential for memory leaks or double deletes in applications using the system. The system encapsulates the management of arrays that are allocated on the heap or on the system stac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006