{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:28Z","timestamp":1763467768181},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540393689"},{"type":"electronic","value":"9783540393726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11847366_23","type":"book-chapter","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T16:50:18Z","timestamp":1157734218000},"page":"220-229","source":"Crossref","is-referenced-by-count":46,"title":["Discovery of Locality-Improving Refactorings by Reuse Path Analysis"],"prefix":"10.1007","author":[{"given":"Kristof","family":"Beyls","sequence":"first","affiliation":[]},{"given":"Erik H.","family":"D\u2019Hollander","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Berg, E., Hagersten, E.: Fast data-locality profiling of native execution. In: SIGMETRICS, pp. 169\u2013180 (2005)","DOI":"10.1145\/1064212.1064232"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/11428848_21","volume-title":"Computational Science \u2013 ICCS 2005","author":"K. Beyls","year":"2005","unstructured":"Beyls, K., D\u2019Hollander, E.H., Vandeputte, F.: RDVIS: A tool that visualizes the causes of low locality and hints program optimizations. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2005. LNCS, vol.\u00a03515, pp. 166\u2013173. Springer, Heidelberg (2005)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Beyls, K., D\u2019Hollander, E.H.: Intermediately executed code is the key to find refactorings that improve temporal data locality. In: Computing Frontiers, pp. 373\u2013382 (2006)","DOI":"10.1145\/1128022.1128071"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Martonosi, M., Gupta, A., Anderson, T.: Effectiveness of trace sampling for performance debugging tools. In: ACM SIGMETRICS (1993)","DOI":"10.1145\/166955.167023"},{"issue":"2","key":"23_CR5","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/254180.254184","volume":"29","author":"R.A. Uhlig","year":"1997","unstructured":"Uhlig, R.A., Mudge, T.N.: Trace-driven memory simulation: a survey. ACM Comput. Surv.\u00a029(2), 128\u2013170 (1997)","journal-title":"ACM Comput. Surv."},{"key":"23_CR6","volume-title":"Probability and Statistics for Engineers and Scientists","author":"R. Walpole","year":"1993","unstructured":"Walpole, R., Myers, R.: Probability and Statistics for Engineers and Scientists. Prentice-Hall, Englewood Cliffs (1993)"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1145\/198429.198435","volume":"20","author":"K.-H. Li","year":"1994","unstructured":"Li, K.-H.: Reservoir-sampling algorithms of time complexity o(n(1 + log(n\/n))). ACM Trans. Math. Softw.\u00a020(4), 481\u2013493 (1994)","journal-title":"ACM Trans. Math. Softw."},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/11688839_4","volume-title":"Compiler Construction","author":"C. Fang","year":"2006","unstructured":"Fang, C., Carr, S., \u00d6nder, S., Wang, Z.: Path-based reuse distance analysis. In: Mycroft, A., Zeller, A. (eds.) CC 2006 and ETAPS 2006. LNCS, vol.\u00a03923, pp. 32\u201346. Springer, Heidelberg (2006)"},{"key":"23_CR9","unstructured":"Devos, H., Beyls, K., Christiaens, M., Campenhout, J.V., D\u2019Hollander, E.H., Stroobandt, D.: Finding and applying loop transformations for generating optimized FPGA implementations (Transactions on HiPEAC) (submitted)"},{"key":"23_CR10","unstructured":"Buck, B.R., Hollingsworth, J.K.: Data centric cache measurement on the intel itanium 2 processor. In: Proceedings of SuperComputing (2004)"},{"issue":"4","key":"23_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.sysarc.2004.09.004","volume":"51","author":"K. Beyls","year":"2005","unstructured":"Beyls, K., D\u2019Hollander, E.H.: Generating cache hints for improved program efficiency. J. of Systems Architecture\u00a051(4), 223\u2013250 (2005)","journal-title":"J. of Systems Architecture"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, C., Ding, C., Ogihara, M., Zhong, Y., Wu, Y.: A hierarchical model of data locality. In: POPL (2006)","DOI":"10.1145\/1111037.1111040"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/11599548","volume-title":"Parallel Computing Technologies","author":"C. Fang","year":"2005","unstructured":"Fang, C., Carr, S., Onder, S., Wang, Z.: Instruction based memory distance analysis and its application to optimization. In: Malyshkin, V.E. (ed.) PaCT 2005. LNCS, vol.\u00a03606. Springer, Heidelberg (2005)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Marin, G., Mellor-Crummey, J.: Cross-architecture performance predictions for scientific applications using parameterized models. In: SIGMETRICS (2004)","DOI":"10.1145\/1005686.1005691"},{"key":"23_CR15","unstructured":"VanderAa, T., Jayapala, M., Barat, F., Corporaal, H., Catthoor, F., Deconinck, G.: Instruction and data memory energy trade-off using a high-level model. In: ODES (2004)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Shen, X., Zhong, Y., Ding, C.: Locality phase prediction. In: ASPLOS-XI, pp. 165\u2013176 (2004)","DOI":"10.1145\/1024393.1024414"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11847366_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:42:12Z","timestamp":1605624132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11847366_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540393689","9783540393726"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11847366_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}