Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system to accelerate address conversion from a virtual address to a physical address by mapping a virtual memory area by a large page according to a use situation of a virtual memory and individually processing a physical page corresponding to a virtual page needing individual coping inside the virtual memory area mapped to the large page. SOLUTION: In this method to accelerate the address conversion to the physical address, a computer maps the virtual memory area including a plurality of virtual pages each having a page unit satisfying a prescribed condition by the large page that is an area larger than the virtual page, and sets physical memory protection information for protecting the physical page corresponding to a part of the virtual pages wherein a memory protection attribute differs on condition that the memory protection attribute of the part of the virtual pages included in the mapping large page differs from a memory protection attribute of the other virtual pages. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To perform an electric power saving mode without causing degradation of performance, in a computer using a garbage collection (GC). SOLUTION: A memory power control method operates the garbage collection for collecting objects which have become unnecessary in a mass, by using a computer having a memory with the electric power saving mode, and assigns the objects to memory blocks obtained by dividing an address space of the memory with a predetermined fixed size. Further, the method performs the steps of: dividing a heap area 14 on the memory into a plurality of subheap areas for management; and dynamically changing the number of the subheap areas on the basis of size relationship between a necessary time of the garbage collection and a target value defined previously. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To manage an object by accessing management information by non-detection write processing which does not detect the generation of writing in an unchangeable object.SOLUTION: An apparatus for executing a target program includes: a storage part for storing a value of an object and management information of the object in association with each other; a code generation part for generating an optimized object optimized under a condition that the value of the object is unchangeable and an unoptimized code which is executed when the value of the object is changed from the target program; a switching part which when the target program is executed by the optimized code, switches the execution of the target program from execution on the basis of the optimized code to execution on the basis of the unoptimized code according to the generation of writing of a value to the object; and a management part for managing the object by accessing management information by the non-detection write processing which does not detect the generation of writing in the object.
Abstract:
PROBLEM TO BE SOLVED: To provide a management device, a management program and a management method that efficiently manages shared data. SOLUTION: The management device for managing data includes: a data storage part for storing the data; a plurality of entry storage parts for storing an entry for registering a pointer to the data, respectively; and a plurality of registration parts for retrieving the entry storage part, having a free entry from the plurality of entry storage parts when receiving a data registration instruction, registering the pointer to the data of a registration object in the entry storage part retrieved, and storing the identification information of the entry storage part retrieved in the data storage part, corresponding to the data of the registration object. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To enable a further efficient code elimination by DCE (dead code elimination) in the optimization of a program in a compile. SOLUTION: On the basis of the using state of an object reference in a method read in an execution program, the method read to be processed is determined, the method read determined as the object of processing is in-line developed, the instance variable of the object in the in-line developed method read is made scalar, and the dead code elimination is executed to the execution program in-line developed and made scalar. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To enable a just-in-time compiler to execute optimizing processing of exchanging instruction execution order while guaranteeing an exact exception. SOLUTION: When the instruction order of S1, S2, E1, S3 and S4 is exchanged as shown in the figure, for example, the part from forward moved instruction E1 to instruction S2 located before E1 is registered as an interruption inhibition section R1 and the part from forward moved instruction S4 to instruction S3 located before S4 is registered as an interruption inhibition section R2 (S is an instruction having operation observable from the outside at the time of the execution and E is an instruction having the possibility of the exception occurrence.). The instruction S4 following E1 in the original order is registered as an invalid instruction at the time the exception occurs in R1. When the exception occurs in E1, an interruption handler is started, the instruction in the interruption inhibition section R1 is copied to the other area and S4 is not copied. Further, the branch code to an exception processing routine is added to the end of the copy and the execution is restarted from S1.
Abstract:
PROBLEM TO BE SOLVED: To increase the application range of execution optimization due to method inlining in a language having a security function. SOLUTION: A 1st method with self-recursion includes a step where a code needed for looping by tail recursion is produced, and a step where a code for counting the repetition number of a loop is produced. A security manager corrects depth in a storage area of a frame that is related to a 2nd method. Also, it includes a step where the code of the 1st method undergoes inlining in the 2nd method that includes the 1st method access in which processing is undetermined after being accessed, and a step where access relation of the 1st and 2nd methods in a state before making inlining the 1st method code is acquired and later is stored in an available storage area.
Abstract:
PROBLEM TO BE SOLVED: To fast recognize the set communication for the uniform problems in an execution mode by calculating a communication set in each dimension of an array based on the data structure and the processor expression and then extracting the set communication from the communication set of each dimension when the communication is performed. SOLUTION: An ITR list consists of an ITR block and an ITR master, i.e., a management data structure. The ITR block includes an array section that is designated by three sets of start, end and jump width and four sets which designate the opposite party of communication of the relevant area. Then the communication set of the ITR block is calculated in each dimension based on the management data structure of the ITR master and the processor expression that is not affected by the number of processors, and the set communication is extracted from the communication set of each dimension when the communication is performed. Thus, the set communication is fast recognized in an execution mode against the uniform problems.
Abstract:
PROBLEM TO BE SOLVED: To generate an optimum communication schedule when data are transmitted and received between processors which constitute parallel computers or a decentralized multiprocessor system. SOLUTION: The processors which communicate with one another are classified by groups (step 40), nodes are provided for the groups, one to one, and a communication graph having respective sides made to correspond to the communication is generated (steps 4 and 3). Graph are generated by the distances between the nodes. Then the communication graphs by the distances between the nodes are made to correspond to communication steps of the inter- processor communication (step 46). The communication to be made is totally grasped with the communication graphs and the sides of the communication graphs are made to correspond to the inter-processor communication which is made in a certain communication step, so the communication can be optimized.