2010
DOI: 10.1007/978-3-642-14122-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Argument Controlled Profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Since the RMS is a measure of distinct accessed memory cells, it also fails to characterize computations whose running time is determined by the value of some variable: e.g., the RMS of the naive algorithm for computing the factorial of a number n would be constant, regardless of the value of n. Aggregating performance measurements by distinct values of function arguments is an alternative approach that is explored, e.g., in [37].…”
Section: Construction Validitymentioning
confidence: 99%
“…Since the RMS is a measure of distinct accessed memory cells, it also fails to characterize computations whose running time is determined by the value of some variable: e.g., the RMS of the naive algorithm for computing the factorial of a number n would be constant, regardless of the value of n. Aggregating performance measurements by distinct values of function arguments is an alternative approach that is explored, e.g., in [37].…”
Section: Construction Validitymentioning
confidence: 99%
“…Hence, it fails to characterize computations whose running time is determined by the value of some variable: e.g., the RMS of the naive algorithm for computing the factorial of a number n would be constant, regardless of the value of n. Aggregating performance measurements by distinct values of function arguments is an alternative approach that is explored, e.g., in [28].…”
Section: Characterizing Asymptotic Behaviormentioning
confidence: 99%
“…To address this problem, input-sensitive profiling was introduced where the sizes of their inputs and the values of the input parameters are varied to uncover performance problems in the AUT [86,20,51]. Essentially, the standard profiling procedure that we described above is extended with three more steps: 3) study the code of the AUT to understand which methods are specific to certain classes of inputs; 4) construct different combinations of input values to the AUT to find methods involved in bottlenecks, and 5) analyze different execution traces for different combinations of input values to generalize the results.…”
Section: Introductionmentioning
confidence: 99%