Transformation of non-strict structure-data access into scheduled strict access in non-strict dataflow languages

被引:0
|
作者
Inenaga, K [1 ]
Kusakabe, S [1 ]
Amamiya, M [1 ]
机构
[1] Kyushu Univ, Dept Intelligent Syst, Fukuoka 8166580, Japan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to show the feasibility of a fine-grain dataflow computation scheme, we are implementing a fine-grain non-strict dataflow language, called V, on stock parallel machines, using a fine-grain multithreading approach. Fine-grain non-strict data structures such as I-structures provide high level abstraction to easily write programs with potentially high parallelism due to the eager evaluation of non-strict functions and non-strict structure-data. Non-strict data. structures, however, require frequent dynamic scheduling at a fine-grain level, which offsets the gain of latency hiding. In addition to the dynamic scheduling at a fine-grain level, asynchronous access to structure-data using non-strict data structures cause heavy overhead. In order to solve this problem, we employ a method to transform non-strict access to scheduled strict access by dependency analysis. The performance evaluation results indicate that this technique is effective to improve the performance.
引用
收藏
页码:288 / 310
页数:23
相关论文
共 50 条
  • [1] NON-STRICT LANGUAGES - PROGRAMMING AND IMPLEMENTATION
    WRAY, SC
    FAIRBAIRN, J
    [J]. COMPUTER JOURNAL, 1989, 32 (02): : 142 - 151
  • [2] Exception analysis for non-strict languages
    Glynn, K
    Stuckey, PJ
    Sulzmann, M
    Sondergaard, H
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (09) : 98 - 109
  • [3] Compiling non-strict functional languages for the .NET
    Monteiro, M
    Araújo, M
    Borges, R
    Santos, A
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2005, 11 (07) : 1255 - 1274
  • [4] The Non-Strict Projection Lemma
    Meijer, Tomas J.
    Holicki, Tobias
    van den Eijnden, Sebastiaan
    Scherer, Carsten W.
    Heemels, W. P. M. H. Maurice
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (08) : 5584 - 5590
  • [5] Strict and Non-Strict Security Boundary of Distribution Network
    Xiao, Jun
    Xiao, Jucheng
    Zhang, Liyuan
    Zu, Guoqiang
    Zhang, Baoqiang
    [J]. Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2019, 34 (12): : 2637 - 2648
  • [6] Non-strict heterogeneous stacking
    Rooney, Niall
    Patterson, David
    Nugent, Chris
    [J]. PATTERN RECOGNITION LETTERS, 2007, 28 (09) : 1050 - 1061
  • [7] Non-strict Temporal Exploration
    Erlebach, Thomas
    Spooner, Jakob T.
    [J]. STRUCTURAL INFORMATION AND COMMUNICATION COMPLEXITY, SIROCCO 2020, 2020, 12156 : 129 - 145
  • [8] Uniform approximation of associative copulas by strict and non-strict copulas
    Klement, EP
    Mesiar, R
    Pap, E
    [J]. ILLINOIS JOURNAL OF MATHEMATICS, 2001, 45 (04) : 1393 - 1400
  • [9] Strictly Capturing Non-strict Closures
    Sullivan, Zachary J.
    Downen, Paul
    Ariola, Zena M.
    [J]. PEPM '21: PROCEEDINGS OF THE 2021 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION, 2021, : 74 - 89
  • [10] Checking equivalence in a non-strict language
    Kolesar, John C.
    Piskac, Ruzica
    Hallahan, William T.
    [J]. Proceedings of the ACM on Programming Languages, 2022, 6 (OOPSLA2):