Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Synthesizing programs that expose performance bottlenecks Luca Della Toffola, Michael Pradel, Thomas R. Gross |
Synthesizing programs that expose performance bottlenecks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The generalized matrix chain algorithm Henrik Barthels, Marcin Copik, Paolo Bientinesi |
The generalized matrix chain algorithm Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Local memory-aware kernel perforation Daniel Maier, Biagio Cosenza, Ben H. H. Juurlink |
Local memory-aware kernel perforation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Transforming loop chains via macro dataflow graphs Eddie C. Davis, Michelle Mills Strout, Catherine Olschanowsky |
Transforming loop chains via macro dataflow graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lightweight detection of cache conflicts Probir Roy, Shuaiwen Leon Song, Sriram Krishnamoorthy, Xu Liu |
Lightweight detection of cache conflicts Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Dominance-based duplication simulation (DBDS): code duplication to enable compiler optimizations David Leopoldseder, Lukas Stadler, Thomas Würthinger, Josef Eisl, Doug Simon, Hanspeter Mössenböck |
Dominance-based duplication simulation (DBDS): code duplication to enable compiler optimizations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A compiler for cyber-physical digital microfluidic biochips Christopher Curtis, Daniel T. Grissom, Philip Brisk |
A compiler for cyber-physical digital microfluidic biochips Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AutoPA: automatically generating active driver from original passive driver code Jia-Ju Bai, Yu-Ping Wang, Shi-Min Hu |
AutoPA: automatically generating active driver from original passive driver code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synthesizing an instruction selection rule library from semantic specifications Sebastian Buchwald, Andreas Fried, Sebastian Hack |
Synthesizing an instruction selection rule library from semantic specifications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Register allocation for Intel processor graphics Wei-Yu Chen, Guei-Yuan Lueh, Pratik Ashar, Kaiyu Chen, Buqi Cheng |
Register allocation for Intel processor graphics Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Scalable concurrency debugging with distributed graph processing Long Zheng, Xiaofei Liao, Hai Jin, Jieshan Zhao, Qinggang Wang |
Scalable concurrency debugging with distributed graph processing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
nAdroid: statically detecting ordering violations in Android applications Xinwei Fu, Dongyoon Lee, Changhee Jung |
nAdroid: statically detecting ordering violations in Android applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
High performance stencil code generation with lift Bastian Hagedorn, Larisa Stoltzfus, Michel Steuwer, Sergei Gorlatch, Christophe Dubach |
High performance stencil code generation with lift Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Loop transformations leveraging hardware prefetching Savvas Sioutas, Sander Stuijk, Henk Corporaal, Twan Basten, Lou J. Somers |
Loop transformations leveraging hardware prefetching Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Analyzing and optimizing task granularity on the JVM Andrea Rosà, Eduardo Rosales, Walter Binder |
Analyzing and optimizing task granularity on the JVM Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SGXElide: enabling enclave code secrecy via self-modification Erick Bauman, Huibo Wang, Mingwei Zhang, Zhiqiang Lin |
SGXElide: enabling enclave code secrecy via self-modification Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CVR: efficient vectorization of SpMV on x86 processors Biwei Xie, Jianfeng Zhan, Xu Liu, Wanling Gao, Zhen Jia, Xiwen He, Lixin Zhang |
CVR: efficient vectorization of SpMV on x86 processors Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Look-ahead SLP: auto-vectorization in the presence of commutative operations Vasileios Porpodas, Rodrigo C. O. Rocha, Luís F. W. Góes |
Look-ahead SLP: auto-vectorization in the presence of commutative operations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
May-happen-in-parallel analysis with static vector clocks Qing Zhou, Lian Li, Lei Wang, Jingling Xue, Xiaobing Feng |
May-happen-in-parallel analysis with static vector clocks Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Program generation for small-scale linear algebra applications Daniele G. Spampinato, Diego Fabregat-Traver, Paolo Bientinesi, Markus Püschel |
Program generation for small-scale linear algebra applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
CollectionSwitch: a framework for efficient and dynamic collection selection Diego Costa, Artur Andrzejak |
CollectionSwitch: a framework for efficient and dynamic collection selection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Peng Jiang, Gagan Agrawal |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
DeLICM: scalar dependence removal at zero memory cost Michael Kruse, Tobias Grosser |
DeLICM: scalar dependence removal at zero memory cost Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Marcos Yukio Siraichi, Vinícius Fernandes dos Santos, Sylvain Collange, Fernando Magno Quintão Pereira |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Optimal DNN primitive selection with partitioned boolean quadratic programming Andrew Anderson, David Gregg |
Optimal DNN primitive selection with partitioned boolean quadratic programming Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SIMD intrinsics on managed language runtimes Alen Stojanov, Ivaylo Toskov, Tiark Rompf, Markus Püschel |
SIMD intrinsics on managed language runtimes Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Resilient decentralized Android application repackaging detection using logic bombs Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li |
Resilient decentralized Android application repackaging detection using logic bombs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CUDAAdvisor: LLVM-based runtime profiling for modern GPUs Du Shen, Shuaiwen Leon Song, Ang Li, Xu Liu |
CUDAAdvisor: LLVM-based runtime profiling for modern GPUs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Poker: permutation-based SIMD execution of intensive tree search by path encoding Feng Zhang, Jingling Xue |
Poker: permutation-based SIMD execution of intensive tree search by path encoding Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automating efficient variable-grained resiliency for low-power IoT systems Sara S. Baghsorkhi, Christos Margiolas |
Automating efficient variable-grained resiliency for low-power IoT systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Biological computation (keynote) Sara-Jane Dunn |
Biological computation (keynote) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|