Show simple item record

dc.contributor.authorSidiroglou, Stelios
dc.contributor.authorMisailovic, Sasa
dc.contributor.authorHoffmann, Henry Christian
dc.contributor.authorRinard, Martin C.
dc.date.accessioned2012-08-29T20:02:19Z
dc.date.available2012-08-29T20:02:19Z
dc.date.issued2011-09
dc.identifier.isbn978-1-4503-0443-6
dc.identifier.urihttp://hdl.handle.net/1721.1/72440
dc.description.abstractMany modern computations (such as video and audio encoders, Monte Carlo simulations, and machine learning algorithms) are designed to trade off accuracy in return for increased performance. To date, such computations typically use ad-hoc, domain-specific techniques developed specifically for the computation at hand. Loop perforation provides a general technique to trade accuracy for performance by transforming loops to execute a subset of their iterations. A criticality testing phase filters out critical loops (whose perforation produces unacceptable behavior) to identify tunable loops (whose perforation produces more efficient and still acceptably accurate computations). A perforation space exploration algorithm perforates combinations of tunable loops to find Pareto-optimal perforation policies. Our results indicate that, for a range of applications, this approach typically delivers performance increases of over a factor of two (and up to a factor of seven) while changing the result that the application produces by less than 10%.en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2025113.2025133en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleManaging performance vs. accuracy trade-offs with loop perforationen_US
dc.typeArticleen_US
dc.identifier.citationStelios Sidiroglou-Douskos, Sasa Misailovic, Henry Hoffmann, and Martin Rinard. 2011. Managing performance vs. accuracy trade-offs with loop perforation. In Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering (ESEC/FSE '11). ACM, New York, NY, USA, 124-134.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverRinard, Martin C.
dc.contributor.mitauthorSidiroglou, Stelios
dc.contributor.mitauthorMisailovic, Sasa
dc.contributor.mitauthorHoffmann, Henry Christian
dc.contributor.mitauthorRinard, Martin C.
dc.relation.journalProceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering (ESEC/FSE '11)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsSidiroglou-Douskos, Stelios; Misailovic, Sasa; Hoffmann, Henry; Rinard, Martinen
dc.identifier.orcidhttps://orcid.org/0000-0003-0313-9270
dc.identifier.orcidhttps://orcid.org/0000-0001-8095-8523
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record