{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:55:37Z","timestamp":1726059337594},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030352240"},{"type":"electronic","value":"9783030352257"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35225-7_4","type":"book-chapter","created":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T13:04:56Z","timestamp":1574168696000},"page":"36-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Language-Agnostic Optimization and Parallelization for Interpreted Languages"],"prefix":"10.1007","author":[{"given":"Michelle Mills","family":"Strout","sequence":"first","affiliation":[]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[]},{"given":"Kate","family":"Isaacs","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Kreaseck","sequence":"additional","affiliation":[]},{"given":"Julio","family":"C\u00e1rdenas-Rodr\u00edguez","sequence":"additional","affiliation":[]},{"given":"Bonnie","family":"Hurwitz","sequence":"additional","affiliation":[]},{"given":"Kat","family":"Volk","sequence":"additional","affiliation":[]},{"given":"Sam","family":"Badger","sequence":"additional","affiliation":[]},{"given":"Jesse","family":"Bartels","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Bertolacci","sequence":"additional","affiliation":[]},{"given":"Sabin","family":"Devkota","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Encinas","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Gaska","sequence":"additional","affiliation":[]},{"given":"Brandon","family":"Neth","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Sackos","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Stephens","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Willer","sequence":"additional","affiliation":[]},{"given":"Babak","family":"Yadegari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bolz, C.F., Cuni, A., Fijalkowski, M., Rigo, A.: Tracing the meta-level: Pypy\u2019s tracing JIT compiler. In: Proceedings of the 4th Workshop on the Implementation, Compilation, Optimization of Object-Oriented Languages and Programming Systems, pp. 18\u201325. ACM (2009)","DOI":"10.1145\/1565824.1565827"},{"key":"4_CR2","unstructured":"Catanzaro, B., et al.: SEJITS: getting productivity and performance with selective embedded JIT specialization. Technical report UCB\/EECS-2010-23, EECS Department, University of California, Berkeley, March 2010"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-319-52709-3_15","volume-title":"Languages and Compilers for Parallel Computing","author":"F Danford","year":"2017","unstructured":"Danford, F., Welch, E., C\u00e1rdenas-R\u00f3driguez, J., Strout, M.M.: Analyzing parallel programming models for magnetic resonance imaging. In: Ding, C., Criswell, J., Wu, P. (eds.) LCPC 2016. LNCS, vol. 10136, pp. 188\u2013202. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-52709-3_15"},{"key":"4_CR4","unstructured":"Gaska, B.J.: Parforpy: loop parallelism in python. Master\u2019s thesis, University of Arizona (2017)"},{"key":"4_CR5","unstructured":"Gaska, B.J., Jothi, N., Mohammadi, M.S., Volk, K., Strout, M.M.: Handling nested parallelism, load imbalance, and early termination in an orbital analysis code. Technical report \narXiv:1707.09668\n\n, University of Arizona (2017)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Kotzmann, T., Wimmer, C., M\u00f6ssenb\u00f6ck, H., Rodriguez, T., Russell, K., Cox, D.: Design of the Java hotspot&trade; client compiler for Java 6. ACM Trans. Archit. Code Optim. 5(1), 7:1\u20137:32 (2008)","DOI":"10.1145\/1369396.1370017"},{"key":"4_CR7","unstructured":"Lindenbaum, P.: Programming language use distribution from recent programs\/articles, April 2017. \nhttps:\/\/www.biostars.org\/p\/251002\/"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Oh, T., Beard, S.R., Johnson, N.P., Popovych, S., August, D.I.: A generalized framework for automatic scripting language parallelization. In: Proceedings of the 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) (2017, to appear)","DOI":"10.1109\/PACT.2017.28"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Oh, T., Kim, H., Johnson, N.P., Lee, J.W., August, D.I.: Practical automatic loop specialization. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2013, pp. 419\u2013430. ACM, New York (2013)","DOI":"10.1145\/2451116.2451161"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Proceedings of IEEE Symposium on Security and Privacy, pp. 317\u2013331 (2010)","DOI":"10.1109\/SP.2010.26"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Sharif, M., Lanzi, A., Giffin, J., Lee, W.: Automatic reverse engineering of malware emulators. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 94\u2013109. IEEE (2009)","DOI":"10.1109\/SP.2009.27"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Yadegari, B., Debray, S.: Bit-level taint analysis. In: IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM) (2014)","DOI":"10.1109\/SCAM.2014.43"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Yadegari, B., Debray, S.: Symbolic execution of obfuscated code. In: Proceedings of 22nd ACM Conference on Computer and Communications Security (CCS), October 2015","DOI":"10.1145\/2810103.2813663"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-319-67531-2_19","volume-title":"Runtime Verification","author":"B Yadegari","year":"2017","unstructured":"Yadegari, B., Debray, S.: Control dependencies in interpretive systems. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 312\u2013329. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-67531-2_19"}],"container-title":["Lecture Notes in Computer Science","Languages and Compilers for Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35225-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T13:05:56Z","timestamp":1574168756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35225-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030352240","9783030352257"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35225-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LCPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Languages and Compilers for Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"College Station, TX","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lcpc2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/parasol.tamu.edu\/lcpc2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}