Proceedings of the 19th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences 2020
DOI: 10.1145/3425898.3426952
|View full text |Cite
|
Sign up to set email alerts
|

Modeling black-box components with probabilistic synthesis

Abstract: This paper is concerned with synthesizing programs based on black-box oracles: we are interested in the case where there exists an executable implementation of a component or library, but its internal structure is unknown. We are provided with just an API or function signature, and aim to synthesize a program with equivalent behavior.To attack this problem, we detail Presyn: a program synthesizer designed for flexible interoperation with existing programs and compiler toolchains. Presyn uses high-level imperat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…For this work, we base our dataset on a subset 5 of 64 functions extracted from the program synthesis benchmark collated in Collie et al [4]. 6 We then add a main function with the required input/output calls to execute them with randomly generated input/output pairs (referred as IO examples, from now on).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…For this work, we base our dataset on a subset 5 of 64 functions extracted from the program synthesis benchmark collated in Collie et al [4]. 6 We then add a main function with the required input/output calls to execute them with randomly generated input/output pairs (referred as IO examples, from now on).…”
Section: Discussionmentioning
confidence: 99%
“…Specifically, subword-nmt [5] . 4 This has the benefit of decreasing the vocabulary size while making out-of-vocabulary tokens virtually impossible (since unknown tokens can be reconstructed from ASCII characters or other subwords present in the vocabulary).…”
Section: Training Datamentioning
confidence: 99%
See 1 more Smart Citation
“…This makes this verification impossible to embed into a synthesis loop where we check thousands of candidates. Our synthesis must use alternatives like observational equivalence [22] in order to achieve the necessary scalability.…”
Section: Existing Techniquesmentioning
confidence: 99%
“…Constraint matching [27,45,57] provides a way of matching and extracting interfaces from high-level code. Unfortunately, these approaches are brittle [45] -they do not scale beyond a single implementation/accelerator pair, and constraint patterns are extremely hard to write [39,40,58]. Rewrite-rule based compilers can be used to target accelerators [77], but these still rely on initial matching using constraints or similar.…”
Section: Existing Compilation Techniquesmentioning
confidence: 99%