The document describes an approach to implementing embedded domain specific languages (EDSLs) using dependent types for precise language implementation and partial evaluation for efficient language implementation. It presents an EDSL for implementing a reliable network transport protocol as an example. Partial evaluation of the EDSL interpreter specialized for concrete EDSL programs results in significantly more efficient executable code compared to the general interpreter. Guidelines are provided for EDSL developers to fully exploit partial evaluation.
JCConf 2020 - New Java Features Released in 2020Joseph Kuo
油
The document discusses new features in Java releases from JDK 13 to JDK 15, including syntax changes like switch expressions and text blocks, API changes like helpful NullPointerExceptions and reimplementing sockets, and improvements to garbage collectors like ZGC and NUMA-aware memory allocation for G1. It provides code examples to demonstrate the new features and explains their motivations and impacts.
[JavaOne 2011] Models for Concurrent ProgrammingTobias Lindaaker
油
The document discusses models for concurrent programming. It summarizes common misconceptions about threads and concurrency, and outlines some of the core abstractions and tools available in Java for writing concurrent programs, including threads, monitors, volatile variables, java.util.concurrent classes like ConcurrentHashMap, and java.util.concurrent.locks classes like ReentrantLock. It also discusses some models not currently supported in Java like parallel arrays, transactional memory, actors, and Clojure's approach to concurrency using immutable data structures, refs, and atoms.
Seeing with Python presented at PyCon AU 2014Mark Rees
油
This document discusses the history and current state of computer vision. It begins with definitions of computer vision from the 1980s, focusing on machine vision and automatically analyzing images. It then provides a 2014 definition that emphasizes duplicating human vision abilities through electronic image perception and understanding using models from various fields. The document notes computer vision involves more than just image capture, including image processing, algorithm development, and display control. It also lists and briefly describes several popular Python libraries for computer vision tasks, such as PIL, Scipy ndimage, Mahotas, PCV, SimpleCV, and OpenCV. It concludes with resources for learning more about computer vision and Python.
The document discusses various techniques for improving Java application performance, including:
1. Using tools like JVisualVM and JConsole to analyze performance bottlenecks and determine where to focus optimization efforts.
2. Customizing the Java runtime environment through JVM options and garbage collection settings.
3. Following programming tips like using object scopes and final modifiers efficiently, choosing appropriate collection types, leveraging concurrency constructs properly.
4. Reading further on techniques involving Java I/O, NIO, locks, and lock-free programming.
Optimization of parameter settings for GAMG solver in simple solver, OpenFOAM...Masashi Imano
油
The document summarizes presentations given by Masashi Imano of OCAEL Co. Ltd. at OpenFOAM study meetings for beginners in Kansai and Kanto, Japan. It discusses optimizing parameters for the GAMG solver in OpenFOAM, including the number of cells in the coarsest grid level. Testing on a 16-node SGI cluster showed the optimal range was 32-1024 cells. It also discusses parameters like merge levels, number of smoothing sweeps, and their effect on solver speed for different node counts. The document provides guidance on selecting parameters for the GAMG solver in OpenFOAM simulations.
This document provides an agenda for introducing Erlang. It begins with a brief history of Erlang, noting it was created by Ericsson for developing telecommunication systems and needed to support concurrency and error recovery. The rest of the agenda covers key Erlang features like concurrency, distribution, and hot code loading. It also discusses Erlang/OTP design patterns, common tools, applications developed in Erlang, integrated development environments for Erlang, Erlang syntax like functions and modules, how to obtain Erlang, and concludes with a question and answer section.
際際滷s used for an internal training. This explains how to generate Flame Graphs using Java Flight Recorder dumps. There is also an example to use Linux "perf_events" to generate a Java Mixed-Mode Flame Graph.
Java Performance and Using Java Flight RecorderIsuru Perera
油
際際滷s used for an internal training. Explains why throughput and latency are important when measuring performance. How Java Flight Recording can be used to analyze performance issues.
simulating a mobile robot platform and operating environment by ROS
- configure the platform on the simulator
- control the drone fly
- read measurements from different sensors mounted on the platform
- add items to the simulation environment
- apply a simple scenario: e.g. trajectory following or obstacle avoidance algorithm
The document discusses register allocation in LLVM. It begins with an introduction to the register allocation problem and describes LLVM's base register allocation interface. It then provides more details on LLVM's basic register allocation approach and its greedy register allocation approach. The greedy approach uses techniques like live range splitting to improve register allocation.
The document discusses various topics related to tuning the Java Virtual Machine (JVM) for performance, including:
1. Hotspot compiler options like method inlining that can improve performance.
2. Threading models on Solaris like M:N and 1:1 and how tuning thread-related JVM options can significantly impact throughput.
3. Memory and garbage collection tuning like selecting the right GC algorithm, tuning heap sizes, and analyzing GC logs to identify bottlenecks and optimize full GC frequency and duration.
This document proposes a new type of region called AGCMemory for the Real-Time Specification for Java (RTSJ) to improve portability while maintaining predictability. AGCMemory reduces the "floating garbage" problem seen in RTSJ regions by automatically recycling objects created during method invocations. It uses constant-time barriers and internal data structures to track object allocations and support partial deallocation in a way that is more intuitive than nested scopes. The authors evaluate AGCMemory and discuss implementing it in an RTSJ virtual machine and evaluating its performance trade-offs.
This document discusses code metrics and refactoring. It begins with an introduction to metrics and how they can be used to evaluate code quality by measuring attributes like complexity, coupling, and cohesion. Several specific metrics are discussed like CBO, CC, and LCOM. The document then discusses refactoring and how metrics can help identify areas of code that need improvement. Refactoring is presented as an important process to prevent software decay and allow code to be improved over time through iterative testing and modification.
1) The document presents a Synchronous Scheduling Service (SSS) that introduces time-triggered orientation for distributed real-time Java applications.
2) The SSS is based on the Flexible Time-Triggered protocol and is supported as a new service in the Distributed Real-Time Specification for Java.
3) It provides a more predictable network management which is useful for high-integrity applications.
Towards an Integration of the Actor Model in an FRP Language for Small-Scale ...Takuo Watanabe
油
This paper presents an integration of the Actor model in Emfrp, a functional reactive programming language designed for resource constrained embedded systems. In this integration, actors not only express nodes that represent time-varying values, but also present communication mechanism. The integration provides a higher-level view of the internal representation of nodes, representations of time-varying values, as well as an actor-based inter-device communication mechanism.
1. The document describes methods for computing trace metrics like instruction depth, height, and critical path length for basic blocks. It involves analyzing data dependencies between instructions within and across blocks to determine earliest issue cycles while traversing the trace in postorder and inverse postorder.
2. Key steps include finding the best predecessor and successor blocks for each block, computing depth and height values bottom-up and top-down based on dependency latencies, and tracking register liveness across blocks to determine the overall critical path.
Small & Medium Sized Businesses (SMB) : Not To Miss Digital Marketing Stats I...TechShu
油
Small and medium-sized businesses widely use social media and search engine optimization for digital marketing. Specifically, 74.5% of SMBs use social media like Facebook to promote their business, and almost half of SMBs engage in search engine optimization activities. Additionally, having a well-designed website is important for SMBs, with 59% believing their website is integral to their business and 36% of online marketing budgets going towards website development.
40 Must-have Tools for Social Media Managers in 2015TechShu
油
Into social media? These social media tools are must-have in your job.
Social media tools can be divided into three major parts: Social media monitoring tools, Social media management tools and Social media analytics tools.
Visuals are crucial for every business to stand out in the rat race of social media marketing. In a nutshell, to sustain in the competition on social media, you need more and more images. But everybody is doing it. Not all of them are successful in their efforts. How to avoid the mistakes that everyone is doing? Here are the answers.
This document contains a list of common verbs in the English language including forms of to be, to do, to have, and modal verbs expressing ability, permission, possibility among others. It seems to be providing a reference of basic English verb forms and conjugations.
James David Saul took photographs over 30 hours riding the NYC subway without permission. The photographs in "NYC Sub" depict how people orient themselves in crowded subway cars. Saul thanks all subway riders for bringing his photographic project to life and acknowledges support from friends and family.
Social Media Marketing at Startup Saturday KolkataTechShu
油
This document discusses social media and Facebook marketing. It notes that common myths about social media being a trend or not able to generate leads or ROI are wrong. Instead, the key is connecting with and listening to your audience to build a community in the long run. The document advocates being present on Facebook, educating rather than selling, encouraging participation, and focusing on involvement, care, and learning from your audience.
ESWC2015 - Tutorial on Publishing and Interlinking Linked Geospatial DataKostis Kyzirakos
油
In this tutorial we present the life cycle of linked geospatial data and we focus on two important steps: the publication of geospatial data as RDF graphs and interlinking them with each other. Given the proliferation of geospatial information on the Web many kinds of geospatial data are now becoming available as linked datasets (e.g., Google and Bing maps, user-generated geospatial content, public sector information published as open data etc.). The topic of the tutorial is related to all core research areas of the Semantic Web (e.g., semantic information extraction, transformation of data into RDF graphs, interlinking linked data etc.) since there is often a need to re-consider existing core techniques when we deal with geospatial information. Thus, it is timely to train Semantic Web researchers, especially the ones that are in the early stages of their careers, on the state of the art of this area and invite them to contribute to it.
In this tutorial we give a comprehensive background on data models, query languages, implemented systems for linked geospatial data, and we discuss recent approaches on publishing and interlinking geospatial data. The tutorial is complemented with a hands-on session that will familiarize the audience with the state-of-the-art tools in publishing and interlinking geospatial information.
http://event.cwi.nl/eswc2015-geo/
The document discusses the importance of marketing for businesses. It defines marketing as the process used by companies to determine products or services of interest to customers and strategies for sales, communication, and business development. It also outlines various digital marketing tactics like social media, blogs, email campaigns, and search engine optimization that can help businesses generate awareness, build credibility, and manage customer relationships at a low cost. Social media in particular is highlighted as an important tool for businesses to build their brand, engage customers, and drive traffic to their website.
Learn how to target a solid Social Media fan base and following. At Prestige Insight, we believe in understanding your customer base and communicating directly to them.
Java Performance and Using Java Flight RecorderIsuru Perera
油
際際滷s used for an internal training. Explains why throughput and latency are important when measuring performance. How Java Flight Recording can be used to analyze performance issues.
simulating a mobile robot platform and operating environment by ROS
- configure the platform on the simulator
- control the drone fly
- read measurements from different sensors mounted on the platform
- add items to the simulation environment
- apply a simple scenario: e.g. trajectory following or obstacle avoidance algorithm
The document discusses register allocation in LLVM. It begins with an introduction to the register allocation problem and describes LLVM's base register allocation interface. It then provides more details on LLVM's basic register allocation approach and its greedy register allocation approach. The greedy approach uses techniques like live range splitting to improve register allocation.
The document discusses various topics related to tuning the Java Virtual Machine (JVM) for performance, including:
1. Hotspot compiler options like method inlining that can improve performance.
2. Threading models on Solaris like M:N and 1:1 and how tuning thread-related JVM options can significantly impact throughput.
3. Memory and garbage collection tuning like selecting the right GC algorithm, tuning heap sizes, and analyzing GC logs to identify bottlenecks and optimize full GC frequency and duration.
This document proposes a new type of region called AGCMemory for the Real-Time Specification for Java (RTSJ) to improve portability while maintaining predictability. AGCMemory reduces the "floating garbage" problem seen in RTSJ regions by automatically recycling objects created during method invocations. It uses constant-time barriers and internal data structures to track object allocations and support partial deallocation in a way that is more intuitive than nested scopes. The authors evaluate AGCMemory and discuss implementing it in an RTSJ virtual machine and evaluating its performance trade-offs.
This document discusses code metrics and refactoring. It begins with an introduction to metrics and how they can be used to evaluate code quality by measuring attributes like complexity, coupling, and cohesion. Several specific metrics are discussed like CBO, CC, and LCOM. The document then discusses refactoring and how metrics can help identify areas of code that need improvement. Refactoring is presented as an important process to prevent software decay and allow code to be improved over time through iterative testing and modification.
1) The document presents a Synchronous Scheduling Service (SSS) that introduces time-triggered orientation for distributed real-time Java applications.
2) The SSS is based on the Flexible Time-Triggered protocol and is supported as a new service in the Distributed Real-Time Specification for Java.
3) It provides a more predictable network management which is useful for high-integrity applications.
Towards an Integration of the Actor Model in an FRP Language for Small-Scale ...Takuo Watanabe
油
This paper presents an integration of the Actor model in Emfrp, a functional reactive programming language designed for resource constrained embedded systems. In this integration, actors not only express nodes that represent time-varying values, but also present communication mechanism. The integration provides a higher-level view of the internal representation of nodes, representations of time-varying values, as well as an actor-based inter-device communication mechanism.
1. The document describes methods for computing trace metrics like instruction depth, height, and critical path length for basic blocks. It involves analyzing data dependencies between instructions within and across blocks to determine earliest issue cycles while traversing the trace in postorder and inverse postorder.
2. Key steps include finding the best predecessor and successor blocks for each block, computing depth and height values bottom-up and top-down based on dependency latencies, and tracking register liveness across blocks to determine the overall critical path.
Small & Medium Sized Businesses (SMB) : Not To Miss Digital Marketing Stats I...TechShu
油
Small and medium-sized businesses widely use social media and search engine optimization for digital marketing. Specifically, 74.5% of SMBs use social media like Facebook to promote their business, and almost half of SMBs engage in search engine optimization activities. Additionally, having a well-designed website is important for SMBs, with 59% believing their website is integral to their business and 36% of online marketing budgets going towards website development.
40 Must-have Tools for Social Media Managers in 2015TechShu
油
Into social media? These social media tools are must-have in your job.
Social media tools can be divided into three major parts: Social media monitoring tools, Social media management tools and Social media analytics tools.
Visuals are crucial for every business to stand out in the rat race of social media marketing. In a nutshell, to sustain in the competition on social media, you need more and more images. But everybody is doing it. Not all of them are successful in their efforts. How to avoid the mistakes that everyone is doing? Here are the answers.
This document contains a list of common verbs in the English language including forms of to be, to do, to have, and modal verbs expressing ability, permission, possibility among others. It seems to be providing a reference of basic English verb forms and conjugations.
James David Saul took photographs over 30 hours riding the NYC subway without permission. The photographs in "NYC Sub" depict how people orient themselves in crowded subway cars. Saul thanks all subway riders for bringing his photographic project to life and acknowledges support from friends and family.
Social Media Marketing at Startup Saturday KolkataTechShu
油
This document discusses social media and Facebook marketing. It notes that common myths about social media being a trend or not able to generate leads or ROI are wrong. Instead, the key is connecting with and listening to your audience to build a community in the long run. The document advocates being present on Facebook, educating rather than selling, encouraging participation, and focusing on involvement, care, and learning from your audience.
ESWC2015 - Tutorial on Publishing and Interlinking Linked Geospatial DataKostis Kyzirakos
油
In this tutorial we present the life cycle of linked geospatial data and we focus on two important steps: the publication of geospatial data as RDF graphs and interlinking them with each other. Given the proliferation of geospatial information on the Web many kinds of geospatial data are now becoming available as linked datasets (e.g., Google and Bing maps, user-generated geospatial content, public sector information published as open data etc.). The topic of the tutorial is related to all core research areas of the Semantic Web (e.g., semantic information extraction, transformation of data into RDF graphs, interlinking linked data etc.) since there is often a need to re-consider existing core techniques when we deal with geospatial information. Thus, it is timely to train Semantic Web researchers, especially the ones that are in the early stages of their careers, on the state of the art of this area and invite them to contribute to it.
In this tutorial we give a comprehensive background on data models, query languages, implemented systems for linked geospatial data, and we discuss recent approaches on publishing and interlinking geospatial data. The tutorial is complemented with a hands-on session that will familiarize the audience with the state-of-the-art tools in publishing and interlinking geospatial information.
http://event.cwi.nl/eswc2015-geo/
The document discusses the importance of marketing for businesses. It defines marketing as the process used by companies to determine products or services of interest to customers and strategies for sales, communication, and business development. It also outlines various digital marketing tactics like social media, blogs, email campaigns, and search engine optimization that can help businesses generate awareness, build credibility, and manage customer relationships at a low cost. Social media in particular is highlighted as an important tool for businesses to build their brand, engage customers, and drive traffic to their website.
Learn how to target a solid Social Media fan base and following. At Prestige Insight, we believe in understanding your customer base and communicating directly to them.
The document summarizes a technical workshop on wireless sensor networks. It provides an overview of the hardware and software used, including the Tmote Sky and EE sensor nodes, the iNode embedded PCs, and the TinyOS software platform. It also describes the Job scheduling system and iPlatform that are used to define and run experiments on the testbed.
In this deck from FOSDEM'19, Thomas Schwinge presents: Speeding up Programs with OpenACC in GCC.
"Proven in production use for decades, GCC (the GNU Compiler Collection) offers C, C++, Fortran, and other compilers for a multitude of target systems. Over the last few years, we -- formerly known as "CodeSourcery", now a group in "Mentor, a Siemens Business" -- added support for the directive-based OpenACC programming model. Requiring only few changes to your existing source code, OpenACC allows for easy parallelization and code offloading to accelerators such as GPUs. We will present a short introduction of GCC and OpenACC, implementation status, examples, and performance results.
OpenACC is a user-driven directive-based performance-portable parallel programming model designed for scientists and engineers interested in porting their codes to a wide-variety of heterogeneous HPC hardware platforms and architectures with significantly less programming effort than required with a low-level model."
Watch the video: https://wp.me/p3RLHQ-jOR
Learn more: https://fosdem.org/2019/
and
https://www.openacc.org/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Krzysztof Mazepa - Netflow/cflow - ulubionym narzdziem operator坦w SPPROIDEA
油
Netflow is a widely used tool by network operators to monitor network traffic. It works by collecting IP traffic flow information from routers and switches. This flow information can then be used for various purposes such as monitoring network applications and users, network planning, identifying attacks and security threats, usage in billing systems, and analyzing traffic at peering points between operators. The presentation discusses the benefits of using Netflow/cflow mechanisms for network operators and aims to start a discussion on how it can be utilized in service provider and enterprise networks.
Web Template Mechanisms in SOC Verification - DVCon.pdfSamHoney6
油
The document discusses using web template mechanisms to generate verification environments for system-on-chip (SOC) designs. It proposes applying Jinja2 template language to generate consistent software views and hardware verification language views based on platform descriptions in JSON format. This separates the platform data from the views, allowing reuse of tests developed on virtual platforms at the SOC level while hiding differences between the platforms.
Build 2016 - B880 - Top 6 Reasons to Move Your C++ Code to Visual Studio 2015Windows Developer
油
This document provides release notes and information about updates to a software development tool or platform. It includes:
1) A list of 4 updates that have been released along with the dates.
2) Descriptions of improvements to build and link times, support for incremental linking, and optimizations to code generation.
3) Information about new features like whole program optimization, debugging and profiling tools, and partnerships with third party tools.
This document discusses porting, scaling, and optimizing applications on Cray XT systems. It covers topics such as choosing compilers, profiling and debugging applications at scale, understanding CPU affinity, and improvements in the Cray Message Passing Toolkit (MPT). The document provides guidance on leveraging different compilers, collecting performance data using hardware counters and CrayPAT, understanding MPI process binding, and enhancements in MPT 4.0 related to MPI standards support and communication optimizations.
The document provides best practices for handling performance issues in an Odoo deployment. It recommends gathering deployment information, such as hardware specs, number of machines, and integration with web services. It also suggests monitoring tools to analyze system performance and important log details like CPU time, memory limits, and request processing times. The document further discusses optimizing PostgreSQL settings, using tools like pg_activity, pg_stat_statements, and pgbadger to analyze database queries and performance. It emphasizes reproducing issues, profiling code with tools like the Odoo profiler, and fixing problems in an iterative process.
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
油
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document discusses Cisco Stealthwatch and its capabilities for network visibility and security. Stealthwatch collects network flow data from switches, routers, firewalls, and other devices using technologies like NetFlow. It analyzes the flows to provide visibility into network traffic, detect threats, and enable incident response. It also discusses encrypted traffic analysis capabilities that can analyze encrypted flows by examining packet lengths, times, and byte distributions without decrypting the actual content.
The document discusses techniques for improving iOS application build performance and reducing executable size in Xamarin applications. It recommends measuring build times, optimizing for the iOS simulator by avoiding rebuilds and file copying, and optimizing for iOS devices by partially linking assemblies, using the LinkerSafe attribute, and leveraging SmartLink and automatic bindings optimizations. Building configurations and deployment tradeoffs are also covered.
Android boot time optimization involves measuring boot times, analyzing the results, and reducing times. Key areas of focus include the bootloader, kernel initialization, zygote class preloading, and system service startup. Hibernation technologies like QuickBoot and Fast-On can improve resume speeds by saving a system image to flash. The "R-Loader" concept aims to minimize hardware re-initialization on resume by directly loading a suspended kernel image.
Reproducible Computational Pipelines with Docker and Nextflowinside-BigData.com
油
This document summarizes a presentation about using Docker and Nextflow to create reproducible computational pipelines. It discusses two major challenges in computational biology being reproducibility and complexity. Containers like Docker help address these challenges by creating portable and standardized environments. Nextflow is introduced as a workflow framework that allows pipelines to run across platforms and isolates dependencies using containers, enabling fast prototyping. Examples are given of using Nextflow with Docker to run pipelines on different systems like HPC clusters in a scalable and reproducible way.
GNAT for Lego Mindtorms NXT is a GPL port for the GNAT compilation system to the Lego Mindstorms NXT robotic platform. Originally born as an education-oriented project at MIT Media Lab, the Lego Mindstorms has evolved into a succesful commercial product for education in robotics in a moltitude of Universities and high schools across the globe. The latest revision of the platform includes a 32 bits processor and supports several different sensors able to detect distance, colors and sounds and to communicate via the Bluetooth protocol.
Structured concurrency with Kotlin Coroutines
1. Theory
- Coroutines
- Suspending functions
- Asynchronous Flows
- Channels
2. Practice
- Business lookup feature implementation in TransferWise app for Android
The document discusses troubleshooting tools and techniques for the Cisco Nexus 7000. It begins with an introduction to the NXOS architecture and logging capabilities. It then defines several built-in troubleshooting tools for the Nexus 7000 including CLI filtering, debug logging, system logging, feature event history, SPAN, and Ethanalyzer. The document proceeds to cover using these tools to troubleshoot specific issues like CPU, control plane, hardware, vPC, layer 2/3 forwarding, multicast, and QoS.
Solve the colocation conundrum: Performance and density at scale with KubernetesNiklas Quarfot Nielsen
油
As we move from monolithic applications to microservices, the ability to colocate workloads offers a tremendous opportunity to realize greater development velocity, robustness, and resource utilization. But workload colocation can also introduce performance variability and affect service levels. Google describes the problem as the tail at scalethe amplification of negative results observed at the tail of the latency curve when many systems are involved.
With its latest tooling capabilities, Intel has an experiments framework to calculate the trade-offs between low latency and higher density. Niklas Nielsen discusses the challenges and complexities of workload colocation, why solving these challenges matters to your business no matter the size, and how Intel intends to help smarter resource allocations with its latest tooling capabilities and Kubernetes.
This lab guide provides instructions for completing several labs that demonstrate an Intelligent WAN (IWAN) solution. The labs utilize a virtual lab environment containing routers, servers, and PCs in a data center and branch office. Students will navigate the lab topology, generate application traffic, and configure Cisco Prime Infrastructure and other components. The objective is to understand the IWAN architecture and how it optimizes application performance over the WAN.
This document discusses techniques for processing big data streams. It begins with an overview of various data stream processing systems and techniques such as complex event processing, machine learning, and incremental computation. It then discusses research topics including Falcon, an in-database stream analytics system, window operators accelerated by FPGAs, and privacy-preserving stream data processing. Specific techniques covered in more detail include a multiple query optimization scheme for change point detection on Falcon, a novel architecture for a merging network to accelerate handshake joins, and a wire-speed implementation of a sliding-window aggregate operator over out-of-order data streams.
Using the new extended Berkley Packet Filter capabilities in Linux to the improve performance of auditing security relevant kernel events around network, file and process actions.
1. Scrapping Your Inef鍖cient Engine
Using Partial Evaluation to Improve
Domain Speci鍖c Language
Implementation
Edwin Brady and Kevin Hammond
eb@cs.st-andrews.ac.uk
University of St Andrews
ICFP 2010, September 29th 2010
ICFP 2010, September 29th 2010 p.1/20
2. Introduction
We will describe an approach to Embedded Domain
Speci鍖c Language (EDSL) development, combining two
technologies:
Dependent Types for precise language
implementation
Partial Evaluation for ef鍖cient language
implementation
We will use I DRIS, an experimental language with full
dependent types.
(http://www.idris-lang.org/; cabal install idris)
ICFP 2010, September 29th 2010 p.2/20
3. Some Idris Features
I DRIS has several features to help support EDSL
implementation. . .
Full-Spectrum Dependent Types
Compile-time evaluation
Ef鍖cient executable code, via C
Uni鍖cation (type/argument inference)
Plugin decision procedures
Overloadable do-notation, idiom brackets
Simple foreign function interface
. . . and I try to be responsive to feature requests!
ICFP 2010, September 29th 2010 p.3/20
4. A Recipe for EDSLs
Our motivation is a desire to reason about
extra-functional properties of resource-aware programs.
The recipe is:
1. Design an EDSL which guarantees the resource
constraints, represented as a dependent type
2. Implement the interpreter for that EDSL
3. Specialise the interpreter for concrete EDSL
programs, using a partial evaluator
To illustrate this, we present a simple implementation of a
reliable (ARQ) network transport protocol.
ICFP 2010, September 29th 2010 p.4/20
7. Network Protocol EDSL
data ARQ : State -> State -> Set -> Set where
START : ARQ CLOSED OPENING ()
| START_RECV_ACK
: (if_ok : ARQ (OPEN (Ready First)) st t) -
(on_timeout : ARQ OPENING st t) ->
ARQ OPENING st t
| END : ARQ (OPEN (Ready n)) CLOSING ()
| END_RETRY
: ARQ CLOSING CLOSING ()
| END_RECV_ACK
: (if_ok: ARQ CLOSED st t) ->
(on_timeout: ARQ CLOSING st t) ->
ARQ CLOSING st t
...
ICFP 2010, September 29th 2010 p.7/20
8. Network Protocol EDSL
data ARQ : State -> State -> Set -> Set where
...
| WITHIN : Time -> (action : ARQ st st t) ->
(on_timeout : ARQ st st t) ->
ARQ st st t
| IF : Bool -> (if_true : ARQ st st t) ->
(if_false : ARQ st st t) ->
ARQ st st t
| RETURN : t -> ARQ st st t
| BIND : ARQ st st t ->
(k : t -> ARQ st st t) ->
ARQ st st t;
ICFP 2010, September 29th 2010 p.8/20
9. Network Protocol EDSL Interpreter
The interpreter for ARQ is parameterised over the actual
network data, and keeps track of time to check for
timeouts.
params (s:Socket, host:String, port:Int) {
interpBy : Time -> (prog:ARQ st st t) [static] ->
IO (Maybe t);
...
interpBy t END
= checkTime t (sendPacket s host port (CTL S_BYE));
...
}
checkTime : Time -> (IO t) -> IO (Maybe t);
ICFP 2010, September 29th 2010 p.9/20
10. Sending Packets
An example program, which opens a connection, sends
a batch of packets, then closes it, within i microseconds:
sendNumber : Time -> Nat -> ARQ CLOSED CLOSED ();
sendNumber i tot
= WITHIN i
(do { open_connection 500000;
session 500000 O tot First;
close_connection 500000;
(TRACE "Timed out");
The types ensure that the protocol is followed; any
protocol violation is a type error.
ICFP 2010, September 29th 2010 p.10/20
11. Sending Packets
The following function sends tot packets, with no
payload, with timeout i per packet.
session : Time -> Nat -> Nat -> (sq:Seq) ->
ARQ (OPEN (Ready sq)) CLOSING ();
session i n tot sq =
IF (n == tot)
END
(do { TRACE ("Sending " ++ showNat n);
send sq i;
session i (S n) tot (Next sq); });
This program is recursive and not obviously terminating.
ICFP 2010, September 29th 2010 p.11/20
12. Sending Packets (Specialised)
Partial evaluation of the ARQ interpreter with this program
yields:
sessionS : Socket -> String -> Int -> Time ->
Time -> Nat -> Nat -> Seq -> IO (Maybe ());
sessionS s h p t i n tot sq = do {
checkTime t (if (n == tot)
then checkTime t (sendPacket s h p (CTL S_BYE))
else do { putStr ("Sending " ++ showNat n);
checkTime t (sendS s h p t sq i);
checkTime t
(sessionS s h p t (S n) i tot (Next sq))); }
ICFP 2010, September 29th 2010 p.12/20
13. Partial Evaluation
In order to achieve this result, we:
Changed the evaluator to allow caching of
intermediate results
Cache intermediate results for functions with
declared static arguments
This speci鍖cally prevents in鍖nite unfolding of
recursive calls
Host languages job details in the paper
Followed some clearly de鍖ned guidelines when
implementing the interpreter
EDSL developers job details in the paper
ICFP 2010, September 29th 2010 p.13/20
14. Results
Run time, in seconds of user time, for a variety of DSL
programs:
Program Spec Gen Java C
fact1 0.017 8.598 0.081 0.007
fact2 1.650 877.2 1.937 0.653
sumlist 3.181 1148.0 4.413 0.346
copy 0.589 1.974 1.770 0.564
copy_dynamic 0.507 1.763 1.673 0.512
copy_store 1.705 7.650 3.324 1.159
sort_file 5.205 7.510 2.610 1.728
ARQ 0.751 0.990
ICFP 2010, September 29th 2010 p.14/20
15. Results
Run time, in seconds of user time, for a variety of DSL
programs:
Program Spec Gen Java C
fact1 0.017 8.598 0.081 0.007
fact2 1.650 877.2 1.937 0.653
sumlist 3.181 1148.0 4.413 0.346
copy 0.589 1.974 1.770 0.564
copy_dynamic 0.507 1.763 1.673 0.512
copy_store 1.705 7.650 3.324 1.159
sort_file 5.205 7.510 2.610 1.728
ARQ 0.751 0.990
ICFP 2010, September 29th 2010 p.15/20
16. Results
Run time, in seconds of user time, for a variety of DSL
programs:
Program Spec Gen Java C
fact1 0.017 8.598 0.081 0.007
fact2 1.650 877.2 1.937 0.653
sumlist 3.181 1148.0 4.413 0.346
copy 0.589 1.974 1.770 0.564
copy_dynamic 0.507 1.763 1.673 0.512
copy_store 1.705 7.650 3.324 1.159
sort_file 5.205 7.510 2.610 1.728
ARQ 0.751 0.990
ICFP 2010, September 29th 2010 p.16/20
17. Conclusions
I DRISs type system occupies a sweet spot where
partial evaluation is particularly effective.
Tagless interpreters
Existing evaluator; only minor changes required
Comparable performance to hand written C/Java . . .
. . . but veri鍖ed resource usage, via EDSLs
This is not unique to I DRIS!
Techniques equally applicable to Agda, Coq, Guru,
Trellys, Haskell (with GADTs). . .
ICFP 2010, September 29th 2010 p.17/20
18. . . . and 鍖nally
I have been packaging and documenting I DRIS. Please
give it a go!
cabal install idris
http://www.idris-lang.org/
http://www.idris-lang.org/tutorial/
Thank you for your attention.
ICFP 2010, September 29th 2010 p.18/20
19. Partial Evaluation Guidelines
An EDSL developer can fully exploit partial evaluation by
following these guidelines:
1. Index the EDSL representation by its type
2. The interpreter must only pattern match on the
EDSL program to be translated
3. Auxiliary functions which match on dynamic data
must not be passed EDSL code
4. Ensure that all of program construction, generation
and transformation can be evaluated statically
Note: this rules out higher order functions, for
the moment!
ICFP 2010, September 29th 2010 p.19/20
20. Network Protocol EDSL
data ARQ : State -> State -> Set -> Set where
...
| SEND
: Packet -> ARQ (OPEN (Ready n))
(OPEN (Waiting n)) ()
| RESEND
: Packet -> ARQ (OPEN (Waiting n))
(OPEN (Waiting n)) ()
| RECV_ACK
: (if_ok : ARQ (OPEN (Ready (Next n))) st t
(on_timeout : ARQ (OPEN (Waiting n)) st t) ->
ARQ (OPEN (Waiting n)) st t
...
ICFP 2010, September 29th 2010 p.20/20