Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Trace-based affine reconstruction of codes Gabriel Rodríguez, José M. Andión, Mahmut T. Kandemir, Juan Touriño |
Trace-based affine reconstruction of codes Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Re-constructing high-level information for language-specific binary re-optimization Toshihiko Koju, Reid Copeland, Motohiro Kawahito, Moriyoshi Ohara |
Re-constructing high-level information for language-specific binary re-optimization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NRG-loops: adjusting power from within applications Melanie Kambadur, Martha A. Kim |
NRG-loops: adjusting power from within applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Portable performance on asymmetric multicore processors Ivan Jibaja, Ting Cao, Stephen M. Blackburn, Kathryn S. McKinley |
Portable performance on asymmetric multicore processors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A basic linear algebra compiler for structured matrices Daniele G. Spampinato, Markus Püschel |
A basic linear algebra compiler for structured matrices Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
IPAS: intelligent protection against silent output corruption in scientific applications Ignacio Laguna, Martin Schulz, David F. Richards, Jon Calhoun, Luke N. Olson |
IPAS: intelligent protection against silent output corruption in scientific applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Symbolic range analysis of pointers Vitor Paisante, Maroua Maalej, Leonardo Barbosa e Oliveira, Laure Gonnord, Fernando Magno Quintão Pereira |
Symbolic range analysis of pointers Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Communication-aware mapping of stream graphs for multi-GPU platforms Dong Nguyen, Jongeun Lee |
Communication-aware mapping of stream graphs for multi-GPU platforms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Atomicity violation checker for task parallel programs Adarsh Yoga, Santosh Nagarakatte |
Atomicity violation checker for task parallel programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards automatic significance analysis for approximate computing Vassilis Vassiliadis, Jan Riehme, Jens Deussen, Konstantinos Parasyris, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis, Uwe Naumann |
Towards automatic significance analysis for approximate computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cheetah: detecting false sharing efficiently and effectively Tongping Liu, Xu Liu |
Cheetah: detecting false sharing efficiently and effectively Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flexible on-stack replacement in LLVM Daniele Cono D'Elia, Camil Demetrescu |
Flexible on-stack replacement in LLVM Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Inference of peak density of indirect branches to detect ROP attacks Mateus Tymburibá, Rubens E. A. Moreira, Fernando Magno Quintão Pereira |
Inference of peak density of indirect branches to detect ROP attacks Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Opening polyhedral compiler's black box Lénaïc Bagnères, Oleksandr Zinenko, Stéphane Huot, Cédric Bastoul |
Opening polyhedral compiler's black box Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploiting recent SIMD architectural advances for irregular applications Linchuan Chen, Peng Jiang, Gagan Agrawal |
Exploiting recent SIMD architectural advances for irregular applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
gpucc: an open-source GPGPU compiler Jingyue Wu, Artem Belevich, Eli Bendersky, Mark Heffernan, Chris Leary, Jacques A. Pienaar, Bjarke Roune, Rob Springer, Xuetian Weng, Robert Hundt |
gpucc: an open-source GPGPU compiler Details |
Author Comments:
All relevant source code changes have been committed to llvm/clang project.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Have abstraction and eat performance, too: optimized heterogeneous computing with parallel patterns Kevin J. Brown, HyoukJoong Lee, Tiark Rompf, Arvind K. Sujeeth, Christopher De Sa, Christopher R. Aberger, Kunle Olukotun |
Have abstraction and eat performance, too: optimized heterogeneous computing with parallel patterns Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A black-box approach to energy-aware scheduling on integrated CPU-GPU systems Rajkishore Barik, Naila Farooqui, Brian T. Lewis, Chunling Hu, Tatiana Shpeisman |
A black-box approach to energy-aware scheduling on integrated CPU-GPU systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AutoFDO: automatic feedback-directed optimization for warehouse-scale applications Dehao Chen, David Xinliang Li, Tipp Moseley |
AutoFDO: automatic feedback-directed optimization for warehouse-scale applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Portable and transparent software managed scheduling on accelerators for fair resource sharing Christos Margiolas, Michael F. P. O'Boyle |
Portable and transparent software managed scheduling on accelerators for fair resource sharing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
StructSlim: a lightweight profiler to guide structure splitting Probir Roy, Xu Liu |
StructSlim: a lightweight profiler to guide structure splitting Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BlackBox: lightweight security monitoring for COTS binaries Byron Hawkins, Brian Demsky, Michael Bedford Taylor |
BlackBox: lightweight security monitoring for COTS binaries Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sparse flow-sensitive pointer analysis for multithreaded programs Yulei Sui, Peng Di, Jingling Xue |
Sparse flow-sensitive pointer analysis for multithreaded programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Validating optimizations of concurrent C/C++ programs Soham Chakraborty, Viktor Vafeiadis |
Validating optimizations of concurrent C/C++ programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploiting mixed SIMD parallelism by reducing data reorganization overhead Hao Zhou, Jingling Xue |
Exploiting mixed SIMD parallelism by reducing data reorganization overhead Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|