{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T12:54:53Z","timestamp":1712062493984},"reference-count":10,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2006,10,27]],"date-time":"2006-10-27T00:00:00Z","timestamp":1161907200000},"content-version":"vor","delay-in-days":9279,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1981,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The design and construction of a peephole optimizer is described. The optimizer consists of a database of patterns, a translator that translates the patterns into an implementation language, and a pattern\u2010matcher skeleton into which the generated pattern code is inserted. it is argued that this three\u2010part split is a good way to approach the construction of certain kinds of programs.<\/jats:p>","DOI":"10.1002\/spe.4380110608","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T12:10:32Z","timestamp":1163765432000},"page":"639-647","source":"Crossref","is-referenced-by-count":18,"title":["Construction of a peephole optimizer"],"prefix":"10.1002","volume":"11","author":[{"given":"David Alex","family":"Lamb","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,27]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/800004.807937"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/956650.956651"},{"key":"e_1_2_1_4_2","unstructured":"Digital Equipment Corporation VAX\u201011 Architecture Handbook 1979."},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/357094.357098"},{"key":"e_1_2_1_6_2","volume-title":"The Design of an Optimizing Compiler","author":"Wulf W.","year":"1975"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/800004.807939"},{"key":"e_1_2_1_8_2","unstructured":"B. M.Brosgol J. M.Newcomer D. A.Lamb D.Levine M. S.Van DeusenandW. A.Wulf TCOLAda:Revised Report on An Intermediate Representation for the Preliminary Ada Language Technical Report CMU\u2010CS\u201080\u2010105 Carnegie\u2010Mellon University Computer Science Department February 1980."},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/362919.362936"},{"key":"e_1_2_1_10_2","unstructured":"C. V.RamamoorthyandP.Jahanian \u2018Formalizing the specification of target machines for compiler adaptability enhancement\u2019 inSymposium on Computer Software Engineering pp.353\u2013366. New York 1976."},{"key":"e_1_2_1_11_2","unstructured":"W. A.Wulf private communication."}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380110608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380110608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T13:35:17Z","timestamp":1699796117000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380110608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1981,6]]},"references-count":10,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1981,6]]}},"alternative-id":["10.1002\/spe.4380110608"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380110608","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1981,6]]}}}