Research Project Speeds Process for Converting Programs to Multicore

A team of researchers has come up with a technique that lets people describe what their single-core programs are supposed to do in somewhat general terms, and then it automatically generates a version of the program optimized to run on multicore chips. The benefit is that the new version of the program will generate the same results but faster.

"Bellmania," as the technique is called, is described in a paper recently presented at the ACM SPLASH 2016 event, the Association of Computing Machinery's conference on Systems, Programming, Languages and Applications: Software for Humanity. The researchers come from MIT's Computer Science and Artificial Intelligence Laboratory and Stony Brook University.

Multicore computing speeds up programming by splitting up tasks and handing them off to multiple CPUs or cores for processing, storing and reusing results of computations rather than having to re-compute them each time they're needed. Traditionally, the splitting up is done by "hand"; computer scientists manually figure out how to "parallelize" programs.

Bellmania's basic concept is to break a given problem into smaller and smaller subproblems with "recursive divide and conquer." The researcher who needs to run the problem or algorithm describes the first step of the process — how the problem is to be divided in a first go-around and what procedures are to be applied to the resulting segments — and Bellmania figures out how to continue the division in a way that optimizes memory usage.

At each level of the recursion Bellmania will perform an operation on some segment of the matrix and then "outsource" the rest of the work to the subroutines, which can run in parallel. Each subroutine will in turn perform an operation on a segment of the data and hand off remaining work to further subroutines.

"The goal is to arrange the memory accesses such that when you read a cell [of the matrix], you do as much computation as you can with it, so that you will not have to read it again later," said Shachar Itzhaky, first author on the paper and a post-doctoral student in electrical engineering and computer science at MIT, in an article about the project.

Bellmania's magic is in determining how best to manage that handoff by figuring out how much data should be processed at each level and which subroutines will be needed as the program progresses. That parallelization process takes about 15 minutes per algorithm — which is much faster than any human programmer could do the work. As the paper noted, "The resulting implementations are 1.4–46 [times] faster than the original versions and within 2 [percent] to 60 percent of a high-performance hand-crafted implementation."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • data professionals in a meeting

    Data Fluency as a Strategic Imperative

    As an institution's highest level of data capabilities, data fluency taps into the agency of technical experts who work together with top-level institutional leadership on issues of strategic importance.

  • stylized AI code and a neural network symbol, paired with glitching code and a red warning triangle

    New Anthropic AI Models Demonstrate Coding Prowess, Behavior Risks

    Anthropic has released Claude Opus 4 and Claude Sonnet 4, its most advanced artificial intelligence models to date, boasting a significant leap in autonomous coding capabilities while simultaneously revealing troubling tendencies toward self-preservation that include attempted blackmail.

  • university building with classical architecture is partially overlaid by a glowing digital brain graphic

    NSF Invests $100 Million in National AI Research Institutes

    The National Science Foundation has announced a $100 million investment in National Artificial Intelligence Research Institutes, part of a broader White House strategy to maintain American leadership as competition with China intensifies.

  • black analog alarm clock sits in front of a digital background featuring a glowing padlock symbol and cybersecurity icons

    The Clock Is Ticking: Higher Education's Big Push Toward CMMC Compliance

    With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.