Bo Zhao

Bo Zhao

About

12
Publications
4,123
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
87
Citations

Publications

Publications (12)
Chapter
Loop fission is an effective loop optimization for exploiting fine-grained parallelism. Currently, loop fission is widely used in existing parallelizing compilers. To fully exploit the optimization, we proposed and implemented a practical and aggressive loop fission technique. First, we present an aggressive dependence graph pruning method to elimi...
Article
Full-text available
Live Virtual Machine (VM) migration within a data center is an important technology for cloud management, and has brought many benefits to both cloud providers and users. With the development of cloud computing, across-data-center VM migration is also desired. Normally, there is no shared storage system between data centers, hence the storage data...
Article
Full-text available
With the popularity of mobile devices (such as smartphones and tablets) and the development of the Internet of Things, mobile edge computing is envisioned as a promising approach to improving the computation capabilities and energy efficiencies of mobile devices. It deploys cloud data centers at the edge of the network to lower service latency. To...
Conference Paper
Full-text available
The proliferation of mobile devices especially smart phones brings remarkable opportunities for both industry and academia. In particular, the massive data generated from users» usage logs provide the possibilities for stakeholders to know better about consumer behaviors with the aid of data mining. In this paper, we examine the consumer behaviors...
Conference Paper
Live Virtual Machine (VM) migration is an important technology for cloud management and guaranteeing a high service quality. However, existing studies are mainly focusing on improving migration performance but without much consideration of user’s requirements. Also, the migration process is transparent to cloud managers and users. Once a migration...
Article
Full-text available
Semantic gap is a major challenge for virtualization security applications. Many researches have been carried out represented by virtual machine introspection around bridging the semantic gap. This paper analyzes the causes of semantic gap problem, discusses the differences of current semantic gap bridging method in the aspects of extracting and vi...
Conference Paper
Full-text available
Nowadays, almost all the processors are integrated with SIMD extensions, with which significant speedup is obtained for the programs in multimedia and scientific computation. The length of SIMD vector register has been increasing all the time. For instance, the original length of SIMD extension components is 64-bit in MMX. It then rises to 128-bit...
Article
To further parallelize large-scale nonlinear scientific computing applications, some data dependence techniques for nonlinear subscripts, especially for quadratic subscripts, were proposed in the past. The quadratic programming (QP) test and polynomial variable interval (PVI) test are two representative techniques. The QP test, which serves as an e...
Article
Full-text available
Code generation belongs to the backend of parallelizing compiler, and is for generating efficient computation and communication code for the target parallel computing system. Traditional research resolve array redistribution mainly by generating communication code that each processor sends all data defined in its local memory to all processors, but...

Network

Cited By