2013
DOI: 10.1145/2499937.2499943
|View full text |Cite
|
Sign up to set email alerts
|

On the Inference of Resource Usage Upper and Lower Bounds

Abstract: Cost analysis aims at determining the amount of resources required to run a program in terms of its input data sizes. The most challenging step is to infer the cost of executing the loops in the program. This requires bounding the number of iterations of each loop and finding tight bounds for the cost of each of its iterations. This article presents a novel approach to infer upper and lower bounds from cost relations. These relations are an extended form of standard recurrence equations that can be nondetermin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(47 citation statements)
references
References 33 publications
0
47
0
Order By: Relevance
“…This substitution instantiates every variable i ∈ V by the arithmetic expression t i . Furthermore, it maps each 3 x ∈ V \ to x, i.e., the domain of σ is dom(σ ) = { i | 1 ≤ i ≤ k, i t i } and its range is {xσ | x ∈ dom(σ )}. Substitutions are homomorphically extended to terms (i.e., σ (t) instantiates all variables x in the term t by σ (x)) and we usually write tσ instead of σ (t).…”
Section: Program Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…This substitution instantiates every variable i ∈ V by the arithmetic expression t i . Furthermore, it maps each 3 x ∈ V \ to x, i.e., the domain of σ is dom(σ ) = { i | 1 ≤ i ≤ k, i t i } and its range is {xσ | x ∈ dom(σ )}. Substitutions are homomorphically extended to terms (i.e., σ (t) instantiates all variables x in the term t by σ (x)) and we usually write tσ instead of σ (t).…”
Section: Program Modelmentioning
confidence: 99%
“…In [24], the automation of this check has not been discussed. (3) We lift our approach to non-tail-recursive programs in the new Section 4. In contrast, [24] was restricted to tail-recursive integer programs.…”
Section: Introductionmentioning
confidence: 99%
“…For example, for SPEED [23], one would need to verify the correctness of the generated invariants, while using other techniques to verify the implementation of the other parts, e.g., the implementation of the counter-optimal proof-structure procedure. As another example, we consider the extension of costa, described in [11], to handle cases where the cost can be precisely described using a sum such as n i=0 i. In this case, the algorithm for computing the UB is based on using the ranking functions and invariants to first generate recurrence relations and then solve them using computer algebra systems.…”
Section: Discussionmentioning
confidence: 99%
“…There is a long history of techniques for extracting cost information from programs, probably starting with Wegbreit [1975], who computes closed bounds for Lisp programs. Much of the work has been done for imperative languages, as exemplified by the COSTA project for Java bytecode analysis [Albert et al 2012[Albert et al , 2013 and SACO for parallel cost [Albert et al 2018]. We cannot hope to review the entire field here, so concentrate on recent work on cost analysis for functional programs.…”
Section: Related Workmentioning
confidence: 99%