Search Results - "Xue, Jingling"
-
1
Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis
Published in IEEE transactions on software engineering (01-02-2014)“…We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to…”
Get full text
Journal Article -
2
The Reliability Wall for Exascale Supercomputing
Published in IEEE transactions on computers (01-06-2012)“…Reliability is a key challenge to be understood to turn the vision of exascale supercomputing into reality. Inevitably, large-scale supercomputing systems,…”
Get full text
Journal Article -
3
Predicting Cross-Core Performance Interference on Multicore Processors with Regression Analysis
Published in IEEE transactions on parallel and distributed systems (01-05-2016)“…Despite their widespread adoption in cloud computing, multicore processors are heavily under-utilized in terms of computing resources. To avoid the potential…”
Get full text
Journal Article -
4
Durable Address Translation in PCM-Based Flash Storage Systems
Published in IEEE transactions on parallel and distributed systems (01-02-2017)“…Phase change memory (PCM) is a promising DRAM alternative because of its non-volatility, high density, low standby power and close-to-DRAM performance. These…”
Get full text
Journal Article -
5
Query-directed adaptive heap cloning for optimizing compilers
Published in Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (23-02-2013)“…Andersen's pointer analysis becomes more precise when applied with full heap cloning but unscalable for large, heap-intensive programs. In contrast,…”
Get full text
Conference Proceeding -
6
Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions
Published in IEEE transactions on reliability (01-12-2016)“…Spatial errors (e.g., buffer overflows) continue to be one of the dominant threats to software reliability and security in C/C++ programs. Presently, the…”
Get full text
Journal Article -
7
VTensor: Using Virtual Tensors to Build a Layout-Oblivious AI Programming Framework
Published in Journal of computer science and technology (01-09-2023)“…Tensors are a popular programming interface for developing artificial intelligence (AI) algorithms. Layout refers to the order of placing tensor data in the…”
Get full text
Journal Article -
8
Automatic Target Description File Generation
Published in Journal of computer science and technology (01-12-2023)“…Agile hardware design is gaining increasing momentum and bringing new chips in larger quantities to the market faster. However, it also takes new challenges…”
Get full text
Journal Article -
9
Reflection Analysis for Java: Uncovering More Reflective Targets Precisely
Published in 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE) (01-10-2017)“…Reflection, which is widely used in practice and abused by many security exploits, poses a significant obstacle to program analysis. Reflective calls can be…”
Get full text
Conference Proceeding -
10
An Efficient GPU Implementation of Inclusion-Based Pointer Analysis
Published in IEEE transactions on parallel and distributed systems (01-02-2016)“…We present an efficient GPU implementation of Andersen's whole-program inclusion-based pointer analysis, a fundamental analysis on which many others are based,…”
Get full text
Journal Article -
11
Reducing Static Energy in Supercomputer Interconnection Networks Using Topology-Aware Partitioning
Published in IEEE transactions on computers (01-08-2016)“…The key to reducing static energy in supercomputers is switching off their unused components. Routers are the major components of a supercomputer. Whether…”
Get full text
Journal Article -
12
SEED: A Statically Greedy and Dynamically Adaptive Approach for Speculative Loop Execution
Published in IEEE transactions on computers (01-05-2013)“…Research on compiler techniques for thread-level loop speculation has so far remained on studying its performance limits: loop candidates that are worthy of…”
Get full text
Journal Article -
13
Region-Based May-Happen-in-Parallel Analysis for C Programs
Published in 2015 44th International Conference on Parallel Processing (01-09-2015)“…The C programming language continues to play an essential role in the development of system software. May-Happen-in-Parallel (MHP) analysis is the basis of…”
Get full text
Conference Proceeding Journal Article -
14
Parallel Pointer Analysis with CFL-Reachability
Published in 2014 43rd International Conference on Parallel Processing (01-09-2014)“…This paper presents the first parallel implementation of pointer analysis with Context-Free Language (CFL) reachability, an important foundation for supporting…”
Get full text
Conference Proceeding -
15
Design and Implementation of a Highly Efficient DGEMM for 64-Bit ARMv8 Multi-core Processors
Published in 2015 44th International Conference on Parallel Processing (01-09-2015)“…This paper presents the design and implementation of a highly efficient Double-precision General Matrix Multiplication (DGEMM) based on Open BLAS for 64-bit…”
Get full text
Conference Proceeding Journal Article -
16
Optimally Maximizing Iteration-Level Loop Parallelism
Published in IEEE transactions on parallel and distributed systems (01-03-2012)“…Loops are the main source of parallelism in many applications. This paper solves the open problem of extracting the maximal number of iterations from a loop to…”
Get full text
Journal Article -
17
Enhanced Peripheral Nerve Regeneration by a High Surface Area to Volume Ratio of Nerve Conduits Fabricated from Hydroxyethyl Cellulose/Soy Protein Composite Sponges
Published in ACS omega (30-11-2017)“…Multichannel nerve guide conduits (MCNGCs) have been widely studied and exhibited outstanding nerve repair function. However, the effect of the geometric…”
Get full text
Journal Article -
18
WPBOUND: Enforcing Spatial Memory Safety Efficiently at Runtime with Weakest Preconditions
Published in 2014 IEEE 25th International Symposium on Software Reliability Engineering (01-11-2014)“…Spatial errors (e.g., Buffer overflows) continue to be one of the dominant threats to software reliability and security in C/C++ programs. Presently, the…”
Get full text
Conference Proceeding -
19
Acyclic orientation graph coloring for software-managed memory allocation
Published in Science China. Information sciences (01-09-2014)“…This paper presents a novel compiler algorithm,called acyclic orientation graph coloring(AOG coloring),for managing data objects in software-managed memory…”
Get full text
Journal Article -
20
Comparison of quantum dots immunofluorescence histochemistry and conventional immunohistochemistry for the detection of caveolin-1 and PCNA in the lung cancer tissue microarray
Published in Journal of molecular histology (01-08-2009)“…Luminescent semiconductor quantum dots (QDs) are a new class of fluorescent label with wide ranges of applications in cell imaging. In this study, we evaluated…”
Get full text
Journal Article