Proceedings Frontiers '95. The Fifth Symposium on the Frontiers of Massively Parallel Computation
DOI: 10.1109/fmpc.1995.380437
|View full text |Cite
|
Sign up to set email alerts
|

Code generation for multiple mappings

Abstract: There has been a great amount of recent work toward unifying iteration reordering transformations. Many of these approaches represent transformations as a ne mappings from the original iteration space to a new iteration space. These approaches show a great deal of promise, but they all rely on the ability to generate code that iterates over the points in these new iteration spaces in the appropriate order. This problem has been fairly well-studied in the case where all statements use the same mapping. We have … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 41 publications
(56 citation statements)
references
References 14 publications
0
56
0
Order By: Relevance
“…Several works succeeded in relaxing the unimodularity constraint to invertibility (the T matrix has to be invertible), enlarging the set of possible transformations [7,19]. A further step has been achieved by Kelly et al by considering more than one domain and multiple scheduling functions at the same time [15]. All these methods relied on the Fourier-Motzkin elimination method [26] to build the target code.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Several works succeeded in relaxing the unimodularity constraint to invertibility (the T matrix has to be invertible), enlarging the set of possible transformations [7,19]. A further step has been achieved by Kelly et al by considering more than one domain and multiple scheduling functions at the same time [15]. All these methods relied on the Fourier-Motzkin elimination method [26] to build the target code.…”
Section: Related Workmentioning
confidence: 99%
“…The first idea was to compute an appropriate loop stride. At first it was done using the Hermite Normal Form [19,28,7,25], but this was limited to only one domain, then by considering the transformation expression itself [15,2], but some guards cannot be removed in this way. More recent methods suggest to use strip-mining for one domain [10], or to find equivalent transformations with convenient additional dimensions when this is possible [11], or to unroll the loops according to a convenient unroll factor in the case where modulo guards depend on only one loop counter [11].…”
Section: If(m%2==1)mentioning
confidence: 99%
See 1 more Smart Citation
“…The solid arrows represent the dependences in E. The approach taken in the polyhedron model to represent such structures that are unbounded in size is to use set representations to combine different instances to a single set. E.g., the Omega tool [4] provides this functionality.…”
Section: Basic Structuresmentioning
confidence: 99%
“…The resulting index space description defines a legal execution order and places lookups as early as possible. From this description, we can generate code using scanning techniques as the one employed by Omega [4] or the one of Quilleré and Rajopadhye [8]; this code is then rewritten to use newly introduced arrays for storing the value of scheduled occurrence instances.…”
Section: Code Placement By Affine Schedulingmentioning
confidence: 99%