Program

Workshop/Tutorials Day One: Saturday 24th

08:30 - 10:00LLVM Tutorial 1
RWDSL'18: 3rd International Workshop on Real World Domain Specific Languages Session 1
10:00 - 10:30Coffee Break
10:30 - 12:00LLVM Tutorial 2
RWDSL'18: 3rd International Workshop on Real World Domain Specific Languages Session 2
12:00 - 13:30Lunch
13:30 - 15:00LLVM Performance Workshop 1
RWDSL'18: 3rd International Workshop on Real World Domain Specific Languages Session 3
15:00 - 15:30Coffee Break
15:30 - 17:00LLVM Performance Workshop 2
RWDSL'18: 3rd International Workshop on Real World Domain Specific Languages Session 4

Workshop/Tutorials Day Two: Sunday 25th

08:30 - 10:00Tutorial: Improving security with reversibility and session types Session 1
10:00 - 10:30Coffee Break
10:30 - 12:00Tutorial: Improving security with reversibility and session types Session 2
12:00 - 13:30Lunch
13:30 - 15:00Tutorial: Improving security with reversibility and session types Session 3
15:00 - 15:30Coffee Break
15:30 - 17:00Tutorial: Improving security with reversibility and session types Session 4
18:00-20:00HPCA/CGO/PPoPP Welcome Reception and Poster Session

Main Conference Day One: Monday 26th

08:30 - 08:45Opening
08:45 - 09:55HPCA Keynote: What is the role of Architecture and Software Researchers on the Road to Quantum Supremacy?
Margaret Martonosi (Princeton University)
09:55 - 10:20Coffee Break
10:20 - 11:45Session 1: Managed Runtimes
  • SIMD Intrinsics on Managed Language Runtimes
    Alen Stojanov, Ivaylo Toskov (ETH Zurich), Tiark Rompf (Purdue University), Markus Püschel (ETH Zurich)
  • CollectionSwitch: A Framework for Efficient and Dynamic Collection Selection
    Diego Costa and Artur Andrzejak (University of Heidelberg, Germany)
  • Analyzing and Optimizing Task Granularity on the JVM
    Andrea Rosà, Eduardo Rosales, and Walter Binder (University of Lugano, Switzerland)
11:45 - 13:15Lunch
13:15 - 14:55Session 2: Resilience and Security
  • Automating Efficient Variable-Grained Resiliency for Low-Power IoT Systems
    Sara S. Baghsorkhi and Christos Margiolas (Intel, USA)
  • Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs
    Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, and Zhoujun Li (Temple University, USA; University of South Carolina, USA; University of California at Riverside, USA; Beihang University, China)
  • nAdroid: Statically Detecting Ordering Violations in Android Applications
    Xinwei Fu, Dongyoon Lee, and Changhee Jung (Virginia Tech, USA)
  • SGXElide: Enabling Enclave Code Secrecy via Self-Modification
    Erick Bauman, Huibo Wang, Mingwei Zhang, and Zhiqiang Lin (University of Texas at Dallas, USA; Intel Labs, USA)
14:55 - 15:15Coffee Break
15:15 - 16:55Session 3: Best Paper Finalists
  • Poker: Permutation-based SIMD Execution of Intensive Tree Search by Path Encoding
    Feng Zhang and Jingling Xue (UNSW, Australia)
  • High Performance Stencil Code Generation with LIFT
    Bastian Hagedorn, Larisa Stoltzfus, Michel Steuwer, Sergei Gorlatch, and Christophe Dubach (University of Münster, Germany; University of Edinburgh, UK; University of Glasgow, UK)
  • Qubit Allocation
    Marcos Yukio Siraichi, Vinícius Fernandes dos Santos, Sylvain Collange, and Fernando Magno Quintao Pereira (Federal University of Minas Gerais, Brazil; Inria, France)
  • Dominance-based Duplication Simulation (DBDS): Code Duplication to Enable Compiler Optimizations
    David Leopoldseder, Lukas Stadler, Thomas Würthinger, Josef Eisl, Doug Simon, and Hanspeter Mössenböck (JKU Linz, Austria; Oracle Labs, Austria; Oracle Labs, Switzerland)
16:55 - 17:15Coffee Break

Main Conference Day Two: Tuesday 27th

08:00 - 09:40Session 4: Linear Algebra and Vectorization
  • The Generalized Matrix Chain Algorithm
    Henrik Barthels, Marcin Copik, and Paolo Bientinesi (RWTH Aachen University, Germany)
  • CVR: Efficient Vectorization of SpMV on X86 Processors
    Biwei Xie, Jianfeng Zhan, Xu Liu, Wanling Gao, Zhen Jia, Xiwen He, and Lixin Zhang (Institute of Computing Technology at Chinese Academy of Sciences, China; College of William and Mary, USA; Princeton University, USA)
  • Look-Ahead SLP: Auto-vectorization in the Presence of Commutative Operations
    Vasileios Porpodas, Rodrigo C. O. Rocha, and Luís F. W. Góes (Intel, USA; University of Edinburgh, UK; PUC-MG, Brazil)
  • Conflict-Free Vectorization of Associative Irregular Applications with Recent SIMD Architectural Advances
    Peng Jiang and Gagan Agrawal (Ohio State University, USA; The Ohio State University, USA)
09:40 - 10:05Coffee Break
10:05 - 11:45Session 5: Static and Dynamic Analysis
  • Scalable Concurrency Debugging with Distributed Graph Processing
    Long Zheng, Xiaofei Liao, Hai Jin, Jieshan Zhao, and Qinggang Wang (Huazhong University of Science and Technology, China)
  • Lightweight Detection of Cache Conflicts
    Probir Roy, Shuaiwen Leon Song, Sriram Krishnamoorthy, and Xu Liu (College of William and Mary, USA; Pacific Northwest National Laboratory, USA)
  • CUDAAdvisor: LLVM-Based Runtime Profiling for Modern GPUs
    Du Shen, Shuaiwen Leon Song, Ang Li, and Xu Liu (College of William and Mary, USA; Pacific Northwest National Laboratory, USA)
  • May-Happen-in-Parallel Analysis with Static Vector Clocks
    Qing Zhou, Lian Li, Lei Wang, Jingling Xue, and Xiaobing Feng (Institute of Computing Technology at Chinese Academy of Sciences, China; UNSW, Australia)
11:45 - 13:15Lunch
13:15 - 14:25CGO Keynote: Biological Computation
Sara-Jane Dunn (Microsoft Research Limited)
14:25 - 14:50Coffee Break
14:50 - 16:30Session 6: Memory usage Optimisation
  • DeLICM: Scalar Dependence Removal at Zero Memory Cost
    Michael Kruse and Tobias Grosser (Inria, France; ETH Zurich, Switzerland)
  • Loop Transformations Leveraging Hardware Prefetching
    Savvas Sioutas, Sander Stuijk, Henk Corporaal, Twan Basten, and Lou Somers (Eindhoven University of Technology, Netherlands)
  • Transforming Loop Chains via Macro Dataflow Graphs
    Eddie C. Davis, Michelle Mills Strout, and Catherine Olschanowsky (Boise State University, USA; University of Arizona, USA)
  • Local Memory-Aware Kernel Perforation
    Daniel Maier, Biagio Cosenza, and Ben Juurlink (TU Berlin, Germany)

Main Conference Day Three: Wednesday 28th

08:00 - 09:00PPoPP Keynote
09:00 - 09:25Coffee Break
09:25 - 11:05Session 7: Program Generation and Synthesis
  • AutoPA: Automatically Generating Active Driver from Original Passive Driver Code
    Jia-Ju Bai, Yu-Ping Wang, and Shi-Min Hu (Tsinghua University, China)
  • Synthesizing an Instruction Selection Rule Library from Semantic Specifications
    Sebastian Buchwald, Andreas Fried, and Sebastian Hack (KIT, Germany; Saarland University, Germany)
  • Synthesizing Programs That Expose Performance Bottlenecks
    Luca Della Toffola, Michael Pradel, and Thomas R. Gross (ETH Zurich, Switzerland; TU Darmstadt, Germany)
  • Program Generation for Small-Scale Linear Algebra Applications
    Daniele G. Spampinato, Diego Fabregat-Traver, Paolo Bientinesi, and Markus Püschel (ETH Zurich, Switzerland; RWTH Aachen University, Germany)
11:05 - 11:20Coffee Break
11:20 - 12:35Session 8: Compilation for Specialised Domains
  • Optimal DNN Primitive Selection with Partitioned Boolean Quadratic Programming
    Andrew Anderson and David Gregg (Trinity College Dublin, Ireland)
  • Register Allocation for Intel Processor Graphics
    Wei-Yu Chen, Guei-Yuan Lueh, Pratik Ashar, Kaiyu Chen, and Buqi Cheng (Intel, USA; Intel, India)
  • A Compiler for Cyber-Physical Digital Microfluidic Biochips
    Christopher Curtis, Daniel Grissom, and Philip Brisk (University of California at Riverside, USA; Azusa Pacific University, USA)