This disclosure relates generally to data processing and, more specifically, to methods and systems for mapping a computer code to wires and gates.
The approaches described in this section could be pursued but are not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section.
Integrated circuits, such as field-programmable gate array (FPGA) or application-specific integrated circuits (ASIC), can be used in many computing applications. For example, integrated circuits can be used in servers and computing clouds to process Hypertext Transfer Protocol (HTTP) and other requests from client devices, which may provide a faster response than standard software-based applications. Despite the advantages of using integrated circuits in computing applications, designing, programming, and configuring integrated circuits remain a difficult task.
This summary is provided to introduce a selection of concepts in a simplified form that is further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Embodiments disclosed herein are directed to methods and systems for mapping a computer code to wires and gates. According to an example embodiment, a method includes acquiring a code that is written in a programming language. The method may further include generating, based on the code, a finite state machine (FSM). The method may further include generating, based on the FSM, a wires and gates representation. The wires and gates representation may include a plurality of wires and plurality of combinatorial logics.
The method may further include configuring, based on the wires and gates representation, a field-programmable gate array. The method may also include determining that one or more combinatorial logics of the plurality of combinatorial logics does not depend on input from wires of the plurality of wires. The method may further include storing the one or more combinatorial logic in a shift register in response to the determination that one or more combinatorial logics of the plurality of combinatorial logics does not depend on input from wires of the plurality of wires.
The method may further include determining that one or more combinatorial logics of the plurality of combinatorial logics depend on input from wires of the plurality of wires. The method further may include storing the one or more combinatorial logic in flip-flops in response to the determination that one or more combinatorial logics of the plurality of combinatorial logics depend on input from wires of the plurality of wires.
In certain embodiments, input of each of the plurality of wires may represent a symbol selected from a set of symbols of a structured data packet. The size of the symbol can be selected to be equal to a number of bits of the structured data packet transferred per clock cycle according to a data transmission protocol. A number of gates and a number of wires in the wires and gates representation can be optimized based on a rate of bits transferred per clock cycle of the transferring protocol or structure of the structured data packet. The structured data packet can include an ethernet packet, optical transport network packet, or peripheral component interconnect express packet.
The programming language can include a high-level programming language such as JavaScript, C, C++, or a domain specific language. The method may further include optimizing the FSM prior to generating the wires and gates representation. Optimizing the FSM includes minimizing a number of states in the FSM.
According to one example embodiment of the present disclosure, a system for mapping a computer code to wires and gates is provided. The system may include at least one processor and a memory storing processor-executable codes, wherein the at least one processor can be configured to implement the operations of the above-mentioned method for mapping a computer code to wires and gates.
According to another example embodiment of the present disclosure, the steps of the method for mapping a computer code to wires and gates are stored on a machine-readable medium comprising instructions, which, when implemented by one or more processors, perform the recited steps.
Embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements.
The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with exemplary embodiments. These exemplary embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
The technology described herein allows translating a computer code from a high-level programming language to wires and gates representation. Some embodiments of the present disclosure may facilitate optimizing the source code according to requirements of a hardware description. Embodiments of the present disclosure may further allow configuring, based on the wires and gates representation, programmable integrated circuits.
According to an example embodiment, the method for mapping a computer code to wires and gates may include acquiring a code written in a programming language and generating a FSM based on the acquired code. The method may further include generating, based on the FSM, a wires and gates representation. The wires and gates representation may include a plurality of wires and plurality of combinatorial logics. The method may further include configuring, based on the wires and gates representation, a field-programmable gate array.
In some embodiments of the present disclosure, the PEG module 110 may be configured to receive an input code 105. In some embodiments, the input code 105 may be written in an input programming language. The input programming language may be associated with a grammar 170. In some embodiments, the grammar 170 may be determined by an augmented Backus-Naur Form (ABNF). The PEG module may be configured to convert the input code 105 into an AST 115 based on the grammar 170. The AST 115 may be further provided to converter 120.
In some embodiments of the disclosure, the converter 120 may be configured to transform the AST 115 into NFSM 125. Thereafter, NFSM 125 may be provided to the converter 130. The converter 130 may be configured to translate the NFSM 125 into DFSM 135. The DFSM 135 can be provided to optimizer 140.
In some embodiments, optimizer 140 may be configured to optimize the DFSM 135 to obtain a DFSM 145. In some embodiments, the optimization may include minimizing a number of states in the DFSM 135. In various embodiments, optimization can be performed by an implication chart method, Hoperoft's algorithm, Moore reduction procedure, Brzozowski's algorithm, and other techniques. Brzozowski's algorithm includes reversing the edges of a DFSM to produce a NFSM and converting this NFSM to a DFSM using a standard powerset construction by constructing only the reachable states of the converted DFSM. Repeating the reversing a second time produces a DFSM with a provable minimum of number of states in the DFSM.
In some embodiments, the DFSM 145, which is an optimized DFSM 135, can be further provided to converter 130. The converter 130 may be configured to translate the DFSM 145 into a NFSM 150. The NFSM 150 may be further provided to converter 120. The converter 120 may be configured to translate the NFSM 150 into an AST 155. The AST 155 may be further provided to PEG module 110.
In some embodiments, the PEG module 110 may be configured to convert the AST 155 into output code 160 based on a grammar 180. The grammar 180 may specify an output programming language.
In some embodiments, the input languages or output languages may include one of high level programming languages, such as but not limited to C, C++, C#, JavaScript, PHP, Python, Perl, and the like. In various embodiments, the input code or output source code can be optimized to run on various hardware platforms like Advanced RISC Machine (ARM), x86-64, graphics processing unit (GPU), a field-programmable gate array (FPGA), or a custom application-specific integrated circuit (ASIC). In various embodiments, the input code or source code can be optimized to run on various operational systems and platforms, such as Linux, Windows, Mac OS, Android, iOS, OpenCL/CUDA, bare metal, FPGA, and a custom ASIC.
In certain embodiments, the output programming language can be the same as the input programming languages. In these embodiments, the system 100 can be used to optimize the input code 105 by converting the input code 105 to the DFSM 135, optimizing the DFSM 135 in terms of number of states, and converting the optimized DFSM 135 to output code 160 in the original programming language.
In some other embodiments, the input programming language may include a domain specific language (DSL) which is determined by a strict grammar (i.e., ABNF). In these embodiments, the system 100 may be used to convert documents written in a DSL to an output code 160 written in a high-level programming language or a code written in a low-level programming language. In certain embodiments, input code 105 or output code 160 can be written in a presentation language, including, but not limited to, HTML, XML, and XHTML. In some embodiments, input code 105 or output code 160 may include CSS.
In some embodiments, the system 100 may further include a database. The database may be configured to store frequently occurring patterns in the input code written in specific programming languages and parts of optimized DFSM corresponding to the frequently occurring patterns. In these embodiments, the system 100 may include an additional module for looking up a specific pattern of the input code 105 in the database. If the database includes an entry containing a specific pattern and corresponding parts of DFSM, then system 100 may be configured to substitute the specific pattern with the corresponding part of DFSM directly, and by skipping steps for converting the specific pattern to the AST and generating the NFSM and the DFSM.
In some embodiments, the input code or output code may include a binary assembly executable by a processor.
In some embodiments, the input code 105 or output code 160 may be written in a HDL, such as SystemC, Verilog, and Very High Speed Integrated Circuits Hardware Description Language (VHDL). The input code 105 or output code 160 may include bits native to the FPGA as programmed using Joint Test Action Group (JTAG) standards. In certain embodiments, DFSM 135 can be optimized using a constraint solver. The constraint solver may include some requirements on a hardware platform described by the HDL. For example, the requirements may include requirements for a runtime, power usage, and cost of the hardware platform. The optimization of the DFSM 135 can be carried out to satisfy one of the restrictions of the requirements. In certain embodiments, the optimization of the DFSM may be performed to satisfy several requirement restrictions with weights assigned to each of the restrictions. In some embodiments, the DFSM 135 may be formally verified in accordance with a formal specification to detect software-related security vulnerabilities, including but not limited to, memory leak, division-by-zero, out-of-bounds array access, and others.
In certain embodiments, the input source can be written in terms of a technical specification. An example technical specification can include a Request for Comments (RFC). In some embodiments, the technical specification may be associated with a specific grammar. Using the specific grammar, the input code, written in terms of the technical specification, can be translated into the AST 115 and further into the DFSM 135. In some embodiments, the DFSM 135 can be optimized using a constraint solver. The constraint solver may include restrictions described in the technical specification.
In certain embodiments, the system 100 may be configured to receive an RFC 105 for Internet protocol (IP), Transmission Control Protocol (TCP), and HTTP. The system 100 may be configured to program the RFC into a VHDL code, and, in turn, compile the VHDL code into bits 235 native to FPGA 240. The FPGA 240 may be programmed with bits 235. In an example illustrated by
In some embodiments, the client 210 may be configured to send a HTTP request 215 to the FPGA 240. In some embodiments, the HTTP request 215 can be read by the FPGA 240. The FSM 225 may be configured to recognize the HTTP request 215 and return an HTTP response 245 corresponding to the HTTP request 215 back to the client 210. In certain embodiments, the FPGA 240 may include a fabric of FSM 250-260 to keep customers' application logics for recognizing different HTTP requests and providing different HTTP responses.
The system 200 may be an improvement over conventional HTTP servers because the system 200 does not require large computing resources and maintenance of software for treatment of HTTP requests. The system does not need to be physically large and requires a smaller amount of power than conventional HTTP servers.
The method 300 may commence, in block 302, with acquiring a first code, the first code being written in a first language. In block 304, method 300 may include parsing, based on a first grammar associated with the first language, the first code to obtain a first AST. In block 306, the method 300 may include converting the first AST to a NFSM. In block 308, the method 300 may include converting the first NFSM to a first DFSM. In block 310, the method 300 may include optimizing the first DFSM to obtain the second DFSM. In block 312, the method may include converting the second DFSM to a second NFSM. In block 314, the method 300 may include converting the second NFSM to a second AST. In block 316, the method 300 may include recompiling, based on a second grammar associated with a second language, the AST into the second code, the second code being written in the second language.
The example computer system 400 includes a processor or multiple processors 402, a hard disk drive 404, a main memory 406, and a static memory 408, which communicate with each other via a bus 410. The computer system 400 may also include a network interface device 412. The hard disk drive 404 may include a computer-readable medium 420, which stores one or more sets of instructions 422 embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 422 can also reside, completely or at least partially, within the main memory 406 and/or within the processors 402 during execution thereof by the computer system 400. The main memory 406 and the processors 402 also constitute machine-readable media.
While the computer-readable medium 420 is shown in an exemplary embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present application, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions. The term “computer-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media. Such media can also include, without limitation, hard disks, floppy disks, NAND or NOR flash memory, digital video disks, RAM, ROM, and the like.
The exemplary embodiments described herein can be implemented in an operating environment comprising computer-executable instructions (e.g., software) installed on a computer, in hardware, or in a combination of software and hardware. The computer-executable instructions can be written in a computer programming language or can be embodied in firmware logic. If written in a programming language conforming to a recognized standard, such instructions can be executed on a variety of hardware platforms and for interfaces to a variety of operating systems. Although not limited thereto, computer software programs for implementing the present method can be written in any number of suitable programming languages such as, for example, C, Python, Javascript, Go, or other compilers, assemblers, interpreters or other computer languages or platforms.
The PEG module 110, the converter 120, the converter 130, and the optimizer 140 are described above with reference to the system 100 of
In some embodiments, the DFSM 145, can be further provided to translator 510. The translator 510 may be configured to translate the optimized DFSM 145 into a set 520 of wires and gates. The edges of DFSM 145 can be represented as wires. The states can be represented as a combinatorial logic of the wires or a simple gate. The set 520 of wires and gates can be used to match inputs, internal states, and outputs. The set 520 of wires and gates can be also used to design, program, or configure integrated circuits, such as but not limited to FPGAs and ACISs. For example, the set 520 of wires and gates can be used to configure programmable logic blocks and reconfigurable reconnects of FPGA 240 (shown in
The integrated circuits (e.g., FPGA) may receive packets via a network. The packets can include ethernet packets, Optical Transport Network (OTN) packets, Peripheral Component Interconnect Express (PCIE) packets or the like. The packets include an ordered set of inputs in time with a defined beginning, a number of input symbols, and an end. For example, the packets can include a preamble, start frame delimiter, header, protocol specific data, and cyclic redundancy check. The FPGA can be configured to perform operations included in the initial computer code based on wires and gates. For example, the FPGA can be configured to send a reply a received data packet. In another example, the FPGA can be configured to match or filter data packets, forward data packets, or store data packets in the FPGA. In yet another example, the FPGA can be also reconfigured based on the information included in the received data packets.
Depending on a data transferring protocol, the data in packets are clocked at a specific rate. Per each clock only a certain input block of a data packet can be received by a FPGA, such that only a certain number of wires can be used in the FPGA. There is a strong correlation between the number of bits in the input and the corresponding number of wires and number of gates. For the same computer code, fewer gates and wires are needed for a bigger number of bits in the input. There is a linear dependency between the length of a data packet and a number of gates and wires, if the length of the packet is measured as the number of symbols in the packets. The number of symbols in the packet is inversely related to the number of bits in the input. For example, use of one-hot encoding, 8-bit input, and 256 separate wires may represent one of possible 0-255 numbers of input. In case of a transfer of data in packets via a gigabit media-independent interface (GMII) interface, each input block is single 8-bit/8-wire input at each clock cycle.
When using one-hot encoding and 84 states, one separate wire for each state may represent a symbol from 0 to 83. A transition from one state to another state may occur when 0 or 1 possible inputs are matched for each state. The state would not be advancing when inputs are failed to match the whole pattern. Given that there are only 84 possible states and 0 or 1 possible inputs per state, a maximum of 84 wires out of the 256 separate wires could possibly be used. In practice, the same input value can be used multiple times. For example, 0x55 can appear 7 times at the beginning of a packet. Because one input wire can be used multiple times and because there are states with 0 possible inputs such as in the packet ID field, the number of unique input wires that are used tends to be small. For common cases, the number of unique input wires can be 20 wires or less.
At each state, arranged in parallel, a single 8-bit symbol or nothing, is matched by combining the wires from the previous state, or signal in the beginning of the packet, and the wires corresponding to the input symbol, or nothing. Each state can be represented as one of the following:
1. firstStateInput<=packetStart AND inputWireN
2. firstStateInput<=packetStart. A case when no input is needed, or any input is acceptable.
3. currentStateInput<=previousStateN AND inputWireN
4. currentStateInput<=previousStateN. A case when no input is needed, or any input is acceptable.
In a general case, packetStart can be the zeroth state, causing the start of the first state. For states in which any input is acceptable, there is no input wire needed to be looked at. The multiple states that have no input wires looked at may be implemented as a shift register. Any states that are not stored in a flip-flop can be stored in a shift register because these states are not accessed individually.
In the case of transferring data in packets via a 10-gigabit media-independent interface (XGMII) interface, each symbol can be represented as 32 bits at each transition of a clock. When represented with one-hot encoding, the maximum number of wires to represent all possible 32 bits symbols is over 4 billion wires. However, the length of data packet is the same as in the case of a GMII interface. Assuming that there is only ¼ of the possible states and that one input symbol is 4 times larger than in the GMII interface, the number of wires is limited to the symbol count length of the packet, a minimum size being 84 bytes or ¼ that as symbols of 32 bits, ⅛ at 64 bit symbols, and so forth. There can be a fewer number due to redundancies.
Similar considerations can be used when using higher speed/symbol size inputs, such as in transferring protocols with rate of 25 MHz, 125 MHz, 156.25 MHz, 644.53125 MHz, 1.5625 GHz, and so forth. Generally, as the width of an input increases, the number of gates decreases.
When multiple similar packets are matched, the decisions may form a tree. Earlier states are shared in the tree. Each unique type of a packet to be matched requires a minimum of 1 additional gate to uniquely match the packet to the gate and have a maximum number of states not shared with other similar types of packets to match. Generally, when the number of packet matching rules is more than a hundred, as few as 1 or 2 additional gates are required to match a packet. In most cases, only 1 additional gate is needed for each additional matching rule.
The method 600 may commence, in block 602, with acquiring a code. The code can be written in a programming language. The programming language can a high-level programming language, such as, for example, JavaScript, C, C++, domain specific language, and the like. The code can be written in terms of a technical specification. An example technical specification can include an RFC.
In block 604, the method 600 may generate, based on the code, an FSM. In block 606, the method 600 may proceed with generating, based on the FSM, a wires and gates representation. The wires and gates representation may include a plurality of wires and a plurality of combinatorial logics. An input of each of the plurality of wires may represent a symbol from a set of symbols of a structured data packet. The size of the symbol can be equal to a number of bits of the structured data packet transferred per clock cycle according to a data transmission protocol. The packet may include an Ethernet packet, OTN packet, or PCIE packet. The data transmission protocol may include a GMII, XGMII, and so forth. States arising from combinational logic may be stored in the flip flops or alternatively shift registers if the individual states from the flip-flops are not directly needed.
In block 608, the method 600 may include configuring, based on the wires and gates representation, a field-programmable gate array. Combinatorial logics that do not depend on input from wires of the plurality of wires can be implemented in a shift register. Other combinatorial logics can be stored in flip-flops.
Thus, systems and methods for mapping a computer code to wires and gates are disclosed. Although embodiments have been described with reference to specific example embodiments, it may be evident that various modifications and changes can be made to these example embodiments without departing from the broader spirit and scope of the present application. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
This application is a continuation-in-part application of U.S. patent application Ser. No. 15/630,691, titled “Compiling and Optimizing a Computer Code by Minimizing a Number of States in a Finite Machine Corresponding to the Computer Code” filed Jun. 6, 2017 and issued Jun. 12, 2018, as U.S. Pat. No. 9,996,328, the subject matter of which is incorporated herein for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5036476 | Yamaguchi | Jul 1991 | A |
5448496 | Butts | Sep 1995 | A |
5477451 | Brown | Dec 1995 | A |
5510981 | Berger | Apr 1996 | A |
5606690 | Hunter | Feb 1997 | A |
5960200 | Eager | Sep 1999 | A |
5978801 | Yuasa | Nov 1999 | A |
6002861 | Butts | Dec 1999 | A |
6018735 | Hunter | Jan 2000 | A |
6223189 | Steffens | Apr 2001 | B1 |
6308149 | Gaussier | Oct 2001 | B1 |
7136947 | Passerone | Nov 2006 | B1 |
7185081 | Liao | Feb 2007 | B1 |
7188168 | Liao | Mar 2007 | B1 |
7398197 | Mohri | Jul 2008 | B1 |
7503027 | Zhao | Mar 2009 | B1 |
7904850 | Spackman | Mar 2011 | B2 |
7991723 | Dubrovsky | Aug 2011 | B1 |
8024691 | Zilic et al. | Sep 2011 | B2 |
8180964 | Koh | May 2012 | B1 |
8706964 | Koh | Apr 2014 | B1 |
8806456 | Gazzillo | Aug 2014 | B2 |
8966457 | Ebcioglu | Feb 2015 | B2 |
9177253 | Ruehle | Nov 2015 | B2 |
9262555 | Coalson et al. | Feb 2016 | B2 |
9426166 | Billa | Aug 2016 | B2 |
9448965 | Brown et al. | Sep 2016 | B2 |
9996328 | Kluss | Jun 2018 | B1 |
20030018461 | Beer | Jan 2003 | A1 |
20030196194 | Johns | Oct 2003 | A1 |
20030221013 | Lockwood | Nov 2003 | A1 |
20040019883 | Banerjee | Jan 2004 | A1 |
20040103408 | Chilimbi | May 2004 | A1 |
20040172234 | Dapp | Sep 2004 | A1 |
20040215593 | Sharangpani | Oct 2004 | A1 |
20040225999 | Nuss | Nov 2004 | A1 |
20050177736 | de los Santos | Aug 2005 | A1 |
20050257202 | Kaestner | Nov 2005 | A1 |
20060117307 | Averbuch | Jun 2006 | A1 |
20060235811 | Fairweather | Oct 2006 | A1 |
20070130140 | Cytron | Jun 2007 | A1 |
20070226362 | Johnson | Sep 2007 | A1 |
20080071802 | Lucco | Mar 2008 | A1 |
20080082946 | Zilic | Apr 2008 | A1 |
20080140662 | Pandya | Jun 2008 | A1 |
20090083265 | Michailov | Mar 2009 | A1 |
20100094906 | Della-Libera | Apr 2010 | A1 |
20100138367 | Yamagaki | Jun 2010 | A1 |
20100161536 | Clark | Jun 2010 | A1 |
20100281160 | Ros-Giralt | Nov 2010 | A1 |
20110022617 | Yamagaki | Jan 2011 | A1 |
20110307503 | Dlugosch | Dec 2011 | A1 |
20120072380 | Liu | Mar 2012 | A1 |
20120191446 | Binsztok | Jul 2012 | A1 |
20120192163 | Glendenning | Jul 2012 | A1 |
20120192164 | Xu | Jul 2012 | A1 |
20120192165 | Xu | Jul 2012 | A1 |
20120192166 | Xu | Jul 2012 | A1 |
20120221497 | Goyal | Aug 2012 | A1 |
20130007530 | Atasu | Jan 2013 | A1 |
20130046784 | Ruehle | Feb 2013 | A1 |
20130125097 | Ebcioglu | May 2013 | A1 |
20130133064 | Goyal | May 2013 | A1 |
20130156043 | Brown | Jun 2013 | A1 |
20130159239 | Brown | Jun 2013 | A1 |
20130159671 | Brown | Jun 2013 | A1 |
20130174131 | Takeuchi | Jul 2013 | A1 |
20130282649 | Guanella | Oct 2013 | A1 |
20130346929 | Toi | Dec 2013 | A1 |
20140025614 | Noyes | Jan 2014 | A1 |
20140025905 | Brown | Jan 2014 | A1 |
20140067736 | Noyes | Mar 2014 | A1 |
20140068167 | Brown | Mar 2014 | A1 |
20140068234 | Brown | Mar 2014 | A1 |
20140089249 | Dubrovsky et al. | Mar 2014 | A1 |
20140244554 | Atasu | Aug 2014 | A1 |
20140279776 | Brown | Sep 2014 | A1 |
20140280358 | Coalson | Sep 2014 | A1 |
20140282393 | Coalson | Sep 2014 | A1 |
20150039550 | Cheetancheri | Feb 2015 | A1 |
20150067200 | Goyal | Mar 2015 | A1 |
20150067776 | Billa | Mar 2015 | A1 |
20150082207 | Prasad | Mar 2015 | A1 |
20150121337 | Makarov | Apr 2015 | A1 |
20150135171 | Ishii et al. | May 2015 | A1 |
20150242194 | Vargas | Aug 2015 | A1 |
20150277865 | Gorissen et al. | Oct 2015 | A1 |
20150277915 | Kelm | Oct 2015 | A1 |
20150293846 | Goyal | Oct 2015 | A1 |
20150293910 | Mathur | Oct 2015 | A1 |
20150295889 | Goyal | Oct 2015 | A1 |
20160012033 | Craymer | Jan 2016 | A1 |
20160259874 | Andrade | Sep 2016 | A1 |
20160299872 | Vaidyanathan | Oct 2016 | A1 |
20170097852 | Glendenning | Apr 2017 | A1 |
20170131983 | Roytman | May 2017 | A1 |
Number | Date | Country |
---|---|---|
WO2018236384 | Dec 2018 | WO |
Entry |
---|
Keith D. Cooper et al., Optimizing for reduce code space using genetic algorithms, May 5, 1999, [Retrieved on Nov. 22, 2016]. Retrieved from the internet: <URL: https://dl.acm.org/citation.cfm?id=314414> 9 Pages (1-9) (Year: 1999). |
Trishul M. Chilimbi et al., Dynamic hot data stream prefetching for general-purpose programs, Jun. 17-19, 2002, [Retrieved on Nov. 22, 2016]. Retrieved from the internet: <URL: https://dl.acm.org/citation.cfm?id=512554> 11 Pages (199-209) (Year: 2002). |
Trevor Jim et al., Semantics and Algorithms for Data-dependent Grammars, Jan. 17-23, 2010, [Retrieved on Jul. 12, 2019]. Retrieved from the internet: <URL: http://delivery.acm.org/10.1145/1710000/1706347/p417-jinn.pdf> 14 Pages (417-430) (Year: 2010). |
Hiroki Nakahara et al., A Regular Expression Matching Using Non-Deterministic Finite Automation, 2010 IEEE, [Retrieved on Jul. 12, 2019]. Retrieved from the internet: <URL: http://delivery.acm.org/10.1145/3050000/3041605/05558621.pdf> 4 Pages (73-76) (Year : 2010). |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2017/038825, dated Sep. 1, 2017, 8 pages. |
Barrett, William A., “Compiler Design,” Fall 2005, Dec. 21, 2005, Retrieved from the Internet: <http://citseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.462.9894&rep=rep1&type=pdf>, pp. 39, 592. |
Jeuring, Johan et al., “Grammar and Parsing,” [online], 2001 [retrieved on Jan. 31, 2018], Retrieved from the Internet: <URL:http://www.cs.uu.nl/docs/vakken/gont/diktaat.pdf>, 275 pages. |
Medeiros, Sergio et al., “From Regexes to Parsing Expression Grammars,” [online], Oct. 17, 2012 [retrieved on Jan. 31, 2018], Retrieved from the Internet: <URL:https://arxiv.org/pdf/1210.4992.pdf>, 34 pages. |
Deremer, Franklin L., “Generating parsers from BNF grammars,” [online], May 14-16, 1969 [retrieved on Jan. 31, 2018], Retrieved from the Internet: <URL:https://dl.acm.org/citation.cfm?id=1476928>, 8 pages. |
PCT Application PCT/US2017/030627 International Search Report and Written Opinion dated Jun. 16, 2019. |
Number | Date | Country | |
---|---|---|---|
20180373508 A1 | Dec 2018 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15630691 | Jun 2017 | US |
Child | 15970884 | US |