-
Alive2 proof: https://alive2.llvm.org/ce/z/Cyoo2Y
Missed example: https://godbolt.org/z/9zW8PToPe
In this example, `smax((a + 7) / 8, 1)` should be folded to `(a + 7) / 8` based on control flow co…
XChy updated
10 months ago
-
-
It's a bad practice to include build files in version control, I could submit a PR to clean it up a bit and update the ,gitignore if you're up for it;
Also optimization process is quite slow, would…
-
This issue will focus on the problem of assigning backend (cpu, acl_cl, acl_neon) per operation, such as to optimize performance. The end-goal of the on-going work is to develop a computational algori…
-
As the maintainer of Friflo.Engine.ECS I want to ask if the benchmark results in `README.md` can be ordered by column: **Mean**.
Every Component benchmark have now 44 rows. So you are lost in numbe…
-
The quality of an embedding in PyMDE is judged by the collection of of Euclidean distances between pairs of embedding distances.
Euclidean distance is natural for visualization, since it is the dis…
-
**Is your feature request related to a problem? Please describe.**
Not a problem - just an opportunity.
**Describe the solution you'd like**
Profile-Guided Optimization could help with gaining mo…
-
Alive2 proof: it's too slow to verify the vector optimization, so I take GCC as the oracle in the link below
Godbolt link: https://godbolt.org/z/xe6Tzq8Ge
### Motivating example
For the reduce…
XChy updated
5 months ago
-
Alive2 proof: https://alive2.llvm.org/ce/z/ehfCAm
### Motivating example
```llvm
define i8 @src(i8 %inl) {
entry:
%or = or i8 %inl, 3
%cmp = icmp sgt i8 %inl, -1
%s = select i1 %cmp,…
XChy updated
6 months ago
-
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmann…