SlideShare a Scribd company logo
Synthesizing Program Execution
Time Discrepancies in Julia
Used for Scientific Software
Effat Farhana Nasif Imtiaz Akond Rahman
Scientific Software
2
Scientific Software in Julia
• Julia: Designed for scientific and numeric computing
o Scripting : syntax as Python
o Compiled : speed as C
Program Execution Time Discrepancies in Julia
Motivation
“Discrepancies in program execution time is a risk for scientific
software development, which should be mitigated by stakeholders”
Methodology
Filtering Qualitative
rating
Categories
Causes
SOTorrent Dataset
(Baltes et al.)
Category: Data structure
Category: Data analytics
Category: Language Transfer
Category: Language Utilities
Category: Parallel Programming
Category: Data Type
Category: Memory Allocation
Category: Filesystem Operation
Category: Scope Concern
Global
Local
Category Frequency
Category Q AQ VQ
Data Structure Concern (103) 0.36 1.68 556.38
Mathematics/Statistics/Machine Learning (57) 0.20 1.48 384.43
Language Transfer (42) 0.15 1.86 1678.12
Function/Package/Compilation (36) 0.13 1.39 581.50
Parallel Programming (34) 0.12 1.41 580.09
Data Type Concern (21) 0.07 1.52 239.00
Memory Allocation (16) 0.06 1.69 237.56
File Operation (12) 0.04 1.25 454.67
Scope Concern (7) 0.02 1.57 288.71
Cause: Inefficient Program Construct
Cause: Knowledge Gap
Memory Management Julia Knowledge Parallel Programming
Cause: Knowledge Gap
Macro Data Structure Foundational CS
Cause: Scoping
Cause: Type Instability
Vectorization
Loop

Cause: Vectorization
Frequency of Causes
Summary
Scientific Software
2
Cause#10: Data Structure Knowledge Gap
Category#9: Scope Concern
Global
Local
arahman@tntech.edu
akondrahman.github.io
@akondrahman
Backup
https://phys.org/news/2019-08-astronomers-earth-fingerprint-habitable-planets.html
https://www.icr.ac.uk/our-research/centres-and-collaborations/strategic-collaborations/cancer-research-uk-centre
https://www.wired.com/2017/01/self-driving-cars-approach-auto-industry-races-rebuild/
http://hardpict.pw/darwin-op2.html
https://stackoverflow.com/questions/36694459/optimising-a-julia-one-liner-to-make-it-as-fast-as-python
https://www.illinoispolicy.org/daily-comics/rauner-expectation-vs-reality/
https://miro.medium.com/max/3000/1*Dyu63sMUVL-gYEZISOE2BQ.jpeg
https://storage.googleapis.com/ehimages/2017/8/26/img_5edaf03d322353fae687ea03350ce096_1503760338828_original.jpg
https://stackoverflow.com/questions/47491713/julia-best-way-to-sample-from-successively-shrinking-range
https://storage.googleapis.com/groundai-web-prod/media%2Fusers%2Fuser_272673%2Fproject_252412%2Fimages%2Fx3.png
https://stackoverflow.com/questions/36694459/optimising-a-julia-one-liner-to-make-it-as-fast-as-python
https://www.codementor.io/innat_2k14/preferable-tools-for-machine-learning-python-matlab-r-jfozzpphz
https://stackoverflow.com/questions/41639237/best-way-to-eval-in-a-given-scope-context-which-is-in-the-form-of-a-dict
http://blog.rogerluo.me/images/julia-generated-compile-diagram.png
https://computing.llnl.gov/tutorials/parallel_comp/images/parallelProblem2.gif
https://stackoverflow.com/questions/46941164/julia-parallel-code-slower-than-sequential-code-are-there-alternatives-to-remo
https://stackoverflow.com/questions/38399478/huge-memory-allocation-running-a-julia-function
https://miro.medium.com/max/4000/1*nkLi2YLBO3xys_dehSXoQw.png
https://stackoverflow.com/questions/26810171/is-there-an-equivalent-or-close-to-numpy-loadtxt-for-julia
https://www.cs.cmu.edu/link/setting-standards
https://media.geeksforgeeks.org/wp-content/uploads/directory.jpg
https://i2.wp.com/blog.codeanalogies.com/wp-content/uploads/2017/11/474b7-1ywpubaj-_gmws4jedvbufa.png?w=730&ssl=1
https://stackoverflow.com/questions/29877563/performance-of-for-loops-in-julia
https://www.ics.com/sites/default/files/styles/blog_detail/public/images/anti_pattern.jpg?itok=R12fhxzm
https://stackoverflow.com/questions/34980556/memory-computation-efficient-creation-of-array-with-repeated-elements
https://stackoverflow.com/questions/41203425/why-is-julia-allocating-so-much-memory
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS_jXTu1cDHU6U9vY1OrNeDnsneCfhQz_CflaOFfDF75WwwsG8l
https://www.wikihow.com/images/thumb/9/97/Check-Memory-Usage-Step-3-Version-3.jpg/aid4366551-v4-728px-Check-Memory-Usage-Step-3-Version-3.jpg
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSUBRX72hofbNLaGmIrXX77wT0NEEy3CoXSK4G2qHAJcdyq1uRPiA
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSBUcLoGPKruhzguEeWnJagLNdIfJ7AHJKChMBDeQ1dAwlza_HJVg
https://stackoverflow.com/questions/42043590/why-is-this-very-simple-vectorized-code-orders-of-magnitude-slower-than-numpy
https://miro.medium.com/max/1648/1*Q_UZeToStz8YY2oQGiUPqw.png
https://stackoverflow.com/questions/50975707/parallel-computing-in-julia-and-mis-allocating-of-cores
References
https://towardsdatascience.com/python-vectorization-5b882eeef658
https://stackoverflow.com/questions/20613817/julia-julia-lang-performance-compared-to-fortran-and-python
https://impsciuw.org/wp-content/uploads/2018/07/know-do-gap-1.jpg
https://blog.brakmic.com/wp-content/uploads/2015/11/julia_intro_own_macros2.png
https://stackoverflow.com/questions/25009072/how-to-write-good-julia-code-when-dealing-with-multiple-types-and-arrays-mult
https://www.google.com/imgres?imgurl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FbpHWYdx74jo%2Fmaxresdefault.jpg&imgrefurl=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D
bpHWYdx74jo&docid=flCJB17HxKtsOM&tbnid=Z2_24-z15v-ahM%3A&vet=10ahUKEwjxwN-
gzOrkAhWtnuAKHZUoBfQQMwhVKAUwBQ..i&w=1280&h=720&bih=793&biw=1600&q=Array%20or%20link%20list&ved=0ahUKEwjxwN-
gzOrkAhWtnuAKHZUoBfQQMwhVKAUwBQ&iact=mrc&uact=8
https://fvmstatic.s3.amazonaws.com/maps/m/US-OH-EPS-02-6001.pnghttps://softwareengineeringdaily.com/wp-content/uploads/2016/11/julia-language-inside-the-corporation-21-638.jpg
https://stackoverflow.com/questions/27745003/performance-of-the-first-vs-second-call-of-a-function
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQvWf6n2-sraeWSiHEJkctMtfpXN5M5f9PEiqWnp75WHKDeQ1c-
https://softwareengineeringdaily.com/wp-content/uploads/2016/11/julia-language-inside-the-corporation-21-638.jpg
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQhtmdIU4fuy9B4UP44PhYZ9z0hcVkVAT2OIzBfJj5sHM4qk7Y8OA
https://stackoverflow.com/questions/31321810/gini-coefficient-in-julia-efficient-and-accurate-code
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQkBvlPIV2ocl5akiLksJn0yhE1Nnes3VYCVPT47qVshEzSG2Qoyg
https://www.iconfinder.com/icons/3694677/accountancy_accounting_online_accounting_software_financial_services_online_banking_icon
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcRQAEzS4Ivk-f5xPU29nCPIituE5IOVmJ4RfjeIHSIyM9biFSpz
https://www.channelfutures.com/desktop/the-dos-and-donts-of-using-microsoft-teams
https://stackoverflow.com/questions/35799521/julia-efficient-memory-allocation
https://stackoverflow.com/company/logos
https://icon-library.net/icon/data-mining-icon-1.html
http://www.softicons.com/system-
icons/refresh-cl-icons-by-tpdk/java-icon
https://www.amazon.com/Introduction-Algorithms-Eastern-Economy-Thomas/dp/8120340078/ref=asc_df_8120340078/?tag=hyprod-20&linkCode=df0&hvadid=312176709
100&hvpos=1o1&hvnetw=g&hvrand=16435165872965472153&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=1025954&hvtargid=pla-385636858931&psc=1&tag=&ref=&a
dgrpid=60258872537&hvpone=&hvptwo=&hvadid=312176709100&hvpos=1o1&hvnetw=g&hvrand=16435165872965472153&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=1025954&hvtargid=pla-385636858931
https://www.youtube.com/watch?v=q7sgzDH1cR8
http://www.zverovich.net/2016/05/13/giving-up-on-julia.html

More Related Content

Similar to Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software

Senjuti Kundu - Resume
Senjuti Kundu - ResumeSenjuti Kundu - Resume
Senjuti Kundu - Resume
Senjuti Kundu
 
Resume
ResumeResume
Resume
Rana Singh
 
Ch01lect1 et
Ch01lect1 etCh01lect1 et
Ch01lect1 et
AhmedHassanHaji1
 
Enabling high level application development for internet of things
Enabling high level application development for internet of thingsEnabling high level application development for internet of things
Enabling high level application development for internet of thingsPankesh Patel
 
Kallio Chipster Bosc2008
Kallio Chipster Bosc2008Kallio Chipster Bosc2008
Kallio Chipster Bosc2008bosc_2008
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure student
John Scrugham
 
Lenguajes y plataformas de desarrollo
Lenguajes y plataformas de desarrolloLenguajes y plataformas de desarrollo
Lenguajes y plataformas de desarrollo
Jose Luis Calvo Salanova
 
Defect Prediction Over Software Life Cycle in Automotive Domain
Defect Prediction Over Software Life Cycle   in Automotive DomainDefect Prediction Over Software Life Cycle   in Automotive Domain
Defect Prediction Over Software Life Cycle in Automotive Domain
RAKESH RANA
 
Introduction to software1
Introduction to software1 Introduction to software1
Introduction to software1
Hardini_HD
 
Evaluation of morden computer & system attributes in ACA
Evaluation of morden computer &  system attributes in ACAEvaluation of morden computer &  system attributes in ACA
Evaluation of morden computer & system attributes in ACA
Pankaj Kumar Jain
 
A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...
A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...
A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...
Raffi Khatchadourian
 
2014 01-ticosa
2014 01-ticosa2014 01-ticosa
2014 01-ticosa
Pharo
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
JayaKamal
 
Bhadale group of companies our technology ecosystem
Bhadale group of companies our technology ecosystemBhadale group of companies our technology ecosystem
Bhadale group of companies our technology ecosystem
Vijayananda Mohire
 
01 intro to programming in .net
01   intro to programming in .net01   intro to programming in .net
01 intro to programming in .netFelisha Hosein
 
E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)
Chiranjeevi Adi
 
Performance analysis of machine learning approaches in software complexity pr...
Performance analysis of machine learning approaches in software complexity pr...Performance analysis of machine learning approaches in software complexity pr...
Performance analysis of machine learning approaches in software complexity pr...
Sayed Mohsin Reza
 
LOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONSLOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONS
ijdpsjournal
 
Lock free parallel access collections
Lock free parallel access collectionsLock free parallel access collections
Lock free parallel access collections
ijdpsjournal
 

Similar to Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software (20)

Senjuti Kundu - Resume
Senjuti Kundu - ResumeSenjuti Kundu - Resume
Senjuti Kundu - Resume
 
Resume
ResumeResume
Resume
 
Ch01lect1 et
Ch01lect1 etCh01lect1 et
Ch01lect1 et
 
Enabling high level application development for internet of things
Enabling high level application development for internet of thingsEnabling high level application development for internet of things
Enabling high level application development for internet of things
 
Kallio Chipster Bosc2008
Kallio Chipster Bosc2008Kallio Chipster Bosc2008
Kallio Chipster Bosc2008
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure student
 
Lenguajes y plataformas de desarrollo
Lenguajes y plataformas de desarrolloLenguajes y plataformas de desarrollo
Lenguajes y plataformas de desarrollo
 
Defect Prediction Over Software Life Cycle in Automotive Domain
Defect Prediction Over Software Life Cycle   in Automotive DomainDefect Prediction Over Software Life Cycle   in Automotive Domain
Defect Prediction Over Software Life Cycle in Automotive Domain
 
Introduction to software1
Introduction to software1 Introduction to software1
Introduction to software1
 
Evaluation of morden computer & system attributes in ACA
Evaluation of morden computer &  system attributes in ACAEvaluation of morden computer &  system attributes in ACA
Evaluation of morden computer & system attributes in ACA
 
Sambhab_Mohapatra
Sambhab_MohapatraSambhab_Mohapatra
Sambhab_Mohapatra
 
A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...
A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...
A Tool for Rejuvenating Feature Logging Levels via Git Histories and Degree o...
 
2014 01-ticosa
2014 01-ticosa2014 01-ticosa
2014 01-ticosa
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Bhadale group of companies our technology ecosystem
Bhadale group of companies our technology ecosystemBhadale group of companies our technology ecosystem
Bhadale group of companies our technology ecosystem
 
01 intro to programming in .net
01   intro to programming in .net01   intro to programming in .net
01 intro to programming in .net
 
E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)
 
Performance analysis of machine learning approaches in software complexity pr...
Performance analysis of machine learning approaches in software complexity pr...Performance analysis of machine learning approaches in software complexity pr...
Performance analysis of machine learning approaches in software complexity pr...
 
LOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONSLOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONS
 
Lock free parallel access collections
Lock free parallel access collectionsLock free parallel access collections
Lock free parallel access collections
 

More from Akond Rahman

How Do Students Feel About Automated Security Static Analysis Exercises?
How Do Students Feel About Automated Security Static Analysis Exercises? How Do Students Feel About Automated Security Static Analysis Exercises?
How Do Students Feel About Automated Security Static Analysis Exercises?
Akond Rahman
 
Exercise Perceptions: Experience Report From A Secure Software Development Co...
Exercise Perceptions: Experience Report From A Secure Software Development Co...Exercise Perceptions: Experience Report From A Secure Software Development Co...
Exercise Perceptions: Experience Report From A Secure Software Development Co...
Akond Rahman
 
Under-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes ManifestsUnder-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes Manifests
Akond Rahman
 
Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code
Akond Rahman
 
Source Code Properties of Defective Infrastructure as Code Scripts
Source Code Properties of Defective Infrastructure as Code ScriptsSource Code Properties of Defective Infrastructure as Code Scripts
Source Code Properties of Defective Infrastructure as Code Scripts
Akond Rahman
 
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
Akond Rahman
 
What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?
Akond Rahman
 
Comprehension Effort and Programming Activities: Related? Or Not Related?
Comprehension Effort and Programming Activities: Related? Or Not Related?Comprehension Effort and Programming Activities: Related? Or Not Related?
Comprehension Effort and Programming Activities: Related? Or Not Related?
Akond Rahman
 
Characterizing Defective Configuration Scripts Used for Continuous Deployment
Characterizing Defective Configuration Scripts Used for Continuous DeploymentCharacterizing Defective Configuration Scripts Used for Continuous Deployment
Characterizing Defective Configuration Scripts Used for Continuous Deployment
Akond Rahman
 
Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...
Akond Rahman
 
Which Factors Influence Practitioners' Usage of Build Automation Tools?
Which Factors Influence Practitioners' Usage of Build Automation Tools?Which Factors Influence Practitioners' Usage of Build Automation Tools?
Which Factors Influence Practitioners' Usage of Build Automation Tools?
Akond Rahman
 
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Akond Rahman
 
Synthesizing Continuous Deployment Practices in Software Development
Synthesizing Continuous Deployment Practices in Software DevelopmentSynthesizing Continuous Deployment Practices in Software Development
Synthesizing Continuous Deployment Practices in Software Development
Akond Rahman
 

More from Akond Rahman (13)

How Do Students Feel About Automated Security Static Analysis Exercises?
How Do Students Feel About Automated Security Static Analysis Exercises? How Do Students Feel About Automated Security Static Analysis Exercises?
How Do Students Feel About Automated Security Static Analysis Exercises?
 
Exercise Perceptions: Experience Report From A Secure Software Development Co...
Exercise Perceptions: Experience Report From A Secure Software Development Co...Exercise Perceptions: Experience Report From A Secure Software Development Co...
Exercise Perceptions: Experience Report From A Secure Software Development Co...
 
Under-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes ManifestsUnder-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes Manifests
 
Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code
 
Source Code Properties of Defective Infrastructure as Code Scripts
Source Code Properties of Defective Infrastructure as Code ScriptsSource Code Properties of Defective Infrastructure as Code Scripts
Source Code Properties of Defective Infrastructure as Code Scripts
 
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
 
What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?
 
Comprehension Effort and Programming Activities: Related? Or Not Related?
Comprehension Effort and Programming Activities: Related? Or Not Related?Comprehension Effort and Programming Activities: Related? Or Not Related?
Comprehension Effort and Programming Activities: Related? Or Not Related?
 
Characterizing Defective Configuration Scripts Used for Continuous Deployment
Characterizing Defective Configuration Scripts Used for Continuous DeploymentCharacterizing Defective Configuration Scripts Used for Continuous Deployment
Characterizing Defective Configuration Scripts Used for Continuous Deployment
 
Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...
 
Which Factors Influence Practitioners' Usage of Build Automation Tools?
Which Factors Influence Practitioners' Usage of Build Automation Tools?Which Factors Influence Practitioners' Usage of Build Automation Tools?
Which Factors Influence Practitioners' Usage of Build Automation Tools?
 
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
 
Synthesizing Continuous Deployment Practices in Software Development
Synthesizing Continuous Deployment Practices in Software DevelopmentSynthesizing Continuous Deployment Practices in Software Development
Synthesizing Continuous Deployment Practices in Software Development
 

Recently uploaded

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 

Recently uploaded (20)

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 

Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software

Editor's Notes

  1. Control for factors - Which ones should you do to prevent these - example of a program execution time discrepancy at the beginning
  2. Time intensive computational tasks Massive data analysis
  3. 263 posts One post can belong to multiple categories and causes
  4. Data structure choice Memory allocation and program performance
  5. X axis : number of SO posts
  6. X axis : number of SO posts