正在加载图片...
Table of Content Table of Content iaht Roots of Software Inefficiency. Our Goal. Software Efficiency:Does It Matter? of This Book ng War Story Our Initial Trace Implementation Key Points onstructors and Destructors Lazy Co ructior t Constructior 9 Chapter 3 Virtual Function 26 Virtual Function Mechanics 26 Templates and Inheritance The Mechanics of Retumn-by-Value 32 The Return Value Optimization.. onal Constructors ter 5 Object Definition .37 Type Mismatch Eliminate Temporaries with op=() 42 Key Points 43 Chapter .ingle-Threaded Memory Pooling 44 w()anc Version 2: anage ved Size oh act Mem Version 3:Single-Threaded Variable-Size Memory Manager. 52 Key Mer mory Pooling 9 Version 5:Faster Locking 6 Key Points .64 lining Basics Method Invo tion Costs 60 Why Inline? .72 Inlining Detail .75 Inlining Virtual nods ing ii Table of Content Table of Content .................................................................................................................. i Copyright.............................................................................................................................. v Dedication ...................................................................................................................... vi Preface................................................................................................................................ vi Introduction....................................................................................................................... viii Roots of Software Inefficiency................................................................................... viii Our Goal ......................................................................................................................... xi Software Efficiency: Does It Matter?.......................................................................... xi Terminology .................................................................................................................. xii Organization of This Book .........................................................................................xiii Chapter 1. The Tracing War Story................................................................................... 1 Our Initial Trace Implementation.................................................................................. 2 Key Points ....................................................................................................................... 7 Chapter 2. Constructors and Destructors....................................................................... 9 Inheritance....................................................................................................................... 9 Composition .................................................................................................................. 18 Lazy Construction ........................................................................................................ 19 Redundant Construction ............................................................................................. 21 Key Points ..................................................................................................................... 25 Chapter 3. Virtual Functions ........................................................................................... 26 Virtual Function Mechanics ........................................................................................ 26 Templates and Inheritance......................................................................................... 28 Key Points ..................................................................................................................... 31 Chapter 4. The Return Value Optimization .................................................................. 32 The Mechanics of Return-by-Value........................................................................... 32 The Return Value Optimization.................................................................................. 33 Computational Constructors....................................................................................... 35 Key Points ..................................................................................................................... 36 Chapter 5. Temporaries................................................................................................... 37 Object Definition........................................................................................................... 37 Type Mismatch ............................................................................................................. 38 Pass by Value............................................................................................................... 40 Return by Value............................................................................................................ 40 Eliminate Temporaries with op=()........................................................................... 42 Key Points ..................................................................................................................... 43 Chapter 6. Single-Threaded Memory Pooling.............................................................. 44 Version 0: The Global new() and delete()......................................................... 44 Version 1: Specialized Rational Memory Manager................................................. 45 Version 2: Fixed-Size Object Memory Pool ............................................................. 49 Version 3: Single-Threaded Variable-Size Memory Manager............................... 52 Key Points ..................................................................................................................... 58 Chapter 7. Multithreaded Memory Pooling................................................................... 59 Version 4: Implementation.......................................................................................... 59 Version 5: Faster Locking........................................................................................... 61 Key Points ..................................................................................................................... 64 Chapter 8. Inlining Basics ............................................................................................... 66 What Is Inlining?........................................................................................................... 66 Method Invocation Costs ............................................................................................ 69 Why Inline? ................................................................................................................... 72 Inlining Details .............................................................................................................. 73 Inlining Virtual Methods............................................................................................... 73 Performance Gains from Inlining ............................................................................... 74
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有