ANALYZING POTENTIAL BENEFITS OF VECTORIZATION
    3.
    发明申请
    ANALYZING POTENTIAL BENEFITS OF VECTORIZATION 有权
    分析潜在收益的潜在优势

    公开(公告)号:US20140258677A1

    公开(公告)日:2014-09-11

    申请号:US13997140

    申请日:2013-03-05

    IPC分类号: G06F9/30

    CPC分类号: G06F8/41 G06F8/456

    摘要: Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media (transitory and non-transitory) are described herein for analyzing execution of a plurality of executable instructions and, based on the analysis, providing an indication of a benefit to be obtained by vectorization of at least a subset of the plurality of executable instructions. In various embodiments, the analysis may include identification of the subset of the plurality of executable instructions suitable for conversion to one or more single-instruction multiple-data (“SIMD”) instructions.

    摘要翻译: 本文描述了计算机实现的方法,系统,计算设备和计算机可读介质(暂时性和非暂时性)的实施例,用于分析多个可执行指令的执行,并且基于该分析,提供对 可以通过对多个可执行指令的至少一个子集进行向量化来获得。 在各种实施例中,分析可以包括识别适合于转换成一个或多个单指令多数据(“SIMD”)指令的多个可执行指令的子集。

    METHODS AND APPARATUS TO MANAGE OBJECT LOCKS
    8.
    发明申请
    METHODS AND APPARATUS TO MANAGE OBJECT LOCKS 有权
    管理对象锁的方法和设备

    公开(公告)号:US20110153992A1

    公开(公告)日:2011-06-23

    申请号:US12645668

    申请日:2009-12-23

    IPC分类号: G06F9/44 G06F9/46

    摘要: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes receiving an object lock request from a processor, the lock request associated with object lock code to lock an object, and generating object lock-bypass code based on a type of the processor, the object lock-bypass code to execute in a managed runtime in response to receiving the object lock request. The example method also includes identifying a type of instruction set architecture (ISA) associated with the processor, invoking a checkpoint instruction for the processor based on the identified ISA, suspending the object lock code from executing and executing target code when the object is uncontended, and allowing the object lock code to execute when the object is contended.

    摘要翻译: 公开了用于管理对象锁的示例性方法和装置。 所公开的示例性方法包括从处理器接收对象锁定请求,与对象锁定代码相关联的锁定请求以锁定对象,以及基于处理器的类型生成对象锁定旁路代码,执行对象锁定旁路代码 在受管运行时响应于接收到对象锁定请求。 示例性方法还包括识别与处理器相关联的指令集架构(ISA)的类型,基于所识别的ISA调用处理器的检查点指令,当对象不受约束时暂停对象锁定代码执行和执行目标代码, 并允许对象锁定代码在对象被竞争时执行。

    Identifying delinquent object chains in a managed run time environment
    9.
    发明申请
    Identifying delinquent object chains in a managed run time environment 审中-公开
    在受管理的运行时环境中识别违规对象链

    公开(公告)号:US20070156967A1

    公开(公告)日:2007-07-05

    申请号:US11321133

    申请日:2005-12-29

    IPC分类号: G06F12/00

    摘要: In one embodiment, an object oriented programming language can pre-fetch objects and fields within those objects to a cache memory. A hardware performance monitor can be used to identify loads that read from an address that is frequently absent from a memory. Instrumentation can be used to mark the objects that include the frequently missed address. A compiler can identify chains of objects that are frequently absent from memory. The chains of objects can be pre-fetched without regard to the types of object. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,面向对象的编程语言可以将这些对象内的对象和字段预取到高速缓冲存储器。 可以使用硬件性能监视器来识别从存储器中经常缺少的地址读取的加载。 仪器可用于标记包含经常错过的地址的对象。 编译器可以识别经常在内存中不存在的对象链。 可以预取对象的链,而不考虑对象的类型。 描述和要求保护其他实施例。