{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:50:48Z","timestamp":1743033048887,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067938"},{"type":"electronic","value":"9783031067945"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06794-5_54","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"672-683","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy Reduction Method by Compiler Optimization"],"prefix":"10.1007","author":[{"given":"Sheng","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Jing Selena","family":"He","sequence":"additional","affiliation":[]},{"given":"Jingwen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaomeng","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jinke","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"issue":"2","key":"54_CR1","doi-asserted-by":"publisher","first-page":"811","DOI":"10.32604\/iasc.2022.020973","volume":"32","author":"P Hemalatha","year":"2022","unstructured":"Hemalatha, P., Dhanalakshmi, K.: Cellular automata based energy efficient approach for improving security in IoT. Intell. Autom. Soft Comput. 32(2), 811\u2013825 (2022)","journal-title":"Intell. Autom. Soft Comput."},{"issue":"2","key":"54_CR2","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.32604\/cmc.2022.022357","volume":"71","author":"S Mahmoud","year":"2022","unstructured":"Mahmoud, S., Salman, A.: Cost estimate and input energy of floor systems in low seismic regions. Comput. Mater. Continua 71(2), 2159\u20132173 (2022)","journal-title":"Comput. Mater. Continua"},{"issue":"3","key":"54_CR3","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.32604\/csse.2022.020312","volume":"41","author":"M Maharajan","year":"2022","unstructured":"Maharajan, M., Abirami, T.: Energy efficient QoS aware cluster based multihop routing protocol for WSN. Comput. Syst. Sci. Eng. 41(3), 1173\u20131189 (2022)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"2","key":"54_CR4","doi-asserted-by":"publisher","first-page":"2303","DOI":"10.32604\/cmc.2022.021998","volume":"71","author":"HG Zaini","year":"2022","unstructured":"Zaini, H.G.: Forecasting of appliances house in a low-energy depend on grey wolf optimizer. Comput. Mater. Continua 71(2), 2303\u20132314 (2022)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"54_CR5","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.vlsi.2018.03.008","volume":"69","author":"L Bamberg","year":"2019","unstructured":"Bamberg, L., Najafi, A., Garciaortiz, A.: Edge effect aware low-power crosstalk avoidance technique for 3D integration. Integration 69(1), 98\u2013110 (2019)","journal-title":"Integration"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Chen, W., Lueh, G., Ashar, P.J., Chen, K., Cheng, B.: Register allocation for Intel processor graphics. In: Symposium on Code Generation and Optimization, pp. 352\u2013364 (2018)","DOI":"10.1145\/3168806"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Cui, X., Ni, Y., Miao, M., Yufeng, J.: An enhancement of crosstalk avoidance code based on fibonacci numeral system for through silicon vias. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(5), 1601\u20131610 (2017)","DOI":"10.1109\/TVLSI.2017.2651141"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Duan, C., Calle, V.H.C., Khatri, S.P.: Efficient on-chip crosstalk avoidance codec design. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 17(4), 551\u2013560 (2009)","DOI":"10.1109\/TVLSI.2008.2005313"},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Florea, A., Geliert, A.: E-learning approach of the graph coloring problem applied to register allocation in embedded systems. In: The Sixth International Conference on Innovative Computing Technology (INTECH 2016), pp. 173\u2013178 (2016)","DOI":"10.1109\/INTECH.2016.7845027"},{"issue":"9","key":"54_CR10","first-page":"1723","volume":"19","author":"U Gupta","year":"2011","unstructured":"Gupta, U., Ranganathan, N.: A utilitarian approach to variation aware delay, power, and crosstalk noise optimization. IEEE Educ. Activities Dept. 19(9), 1723\u20131726 (2011)","journal-title":"IEEE Educ. Activities Dept."},{"key":"54_CR11","unstructured":"Guthaus, M.R., Ringenberg, J., Ernst, D.J., Austin, T., Mudge, T., et al.: MiBench: a free, commercially representative embedded benchmark suite. In: The 4th Annual IEEE International Workshop on Workload Characterization (WWC 2001), pp. 3\u201314 (2001)"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Halak, B., Yakovlev, A.: Throughput optimization for area-constrained links with crosstalk avoidance methods. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(6), 1016\u20131019 (2010)","DOI":"10.1109\/TVLSI.2009.2017915"},{"issue":"2","key":"54_CR13","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1002\/cta.2378","volume":"46","author":"H Jiao","year":"2018","unstructured":"Jiao, H., Wang, R.R., He, Y.: Crosstalk-noise-aware bus coding with low-power ground-gated repeaters. Int. J. Circuit Theory Appl. 46(2), 280\u2013289 (2018)","journal-title":"Int. J. Circuit Theory Appl."},{"issue":"2","key":"54_CR14","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/s11633-017-1100-0","volume":"15","author":"S Kananizadeh","year":"2018","unstructured":"Kananizadeh, S., Kononenko, K.: Improving on linear scan register allocation. Int. J. Autom. Comput. 15(2), 228\u2013238 (2018). https:\/\/doi.org\/10.1007\/s11633-017-1100-0","journal-title":"Int. J. Autom. Comput."},{"issue":"3","key":"54_CR15","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TCAD.2006.884861","volume":"26","author":"WA Kuo","year":"2007","unstructured":"Kuo, W.A., Chiang, Y.L., Hwang, T.T., Wu, A.C.H.: Performance-driven crosstalk elimination at postcompiler level-the case of low-crosstalk op-code assignment. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(3), 564\u2013573 (2007)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"54_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: IEEE Symposium on Security and Privacy (SP), pp. 605\u2013622 (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"Lozano, R.C., Carlsson, M., Blindell, G.H., Schulte, C.: Combinatorial register allocation and instruction scheduling. arXiv:1804.02452 (2018)","DOI":"10.1145\/3332373"},{"key":"54_CR18","doi-asserted-by":"crossref","unstructured":"Lucas, A.H., Moraes, F.: Crosstalk fault tolerant NOC: design and evaluation. In: IFIP IEEE International Conference on Very Large Scale Integration, pp. 81\u201393 (2009)","DOI":"10.1007\/978-3-642-23120-9_5"},{"issue":"2","key":"54_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.X.: One for all-all for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Secur."},{"issue":"9","key":"54_CR20","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/S0026-2692(03)00133-2","volume":"34","author":"F Moll","year":"2003","unstructured":"Moll, F., Roca, M., Isern, E.: Analysis of dissipation energy of switching digital CMOS gates with coupled outputs. Microelectron. J. 34(9), 833\u2013842 (2003)","journal-title":"Microelectron. J."},{"issue":"3","key":"54_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1529255.1529265","volume":"14","author":"M Mutyam","year":"2009","unstructured":"Mutyam, M.: Selective shielding technique to eliminate crosstalk transitions. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 14(3), 1\u201343 (2009)","journal-title":"ACM Trans. Des. Autom. Electron. Syst. (TODAES)"},{"key":"54_CR22","doi-asserted-by":"crossref","unstructured":"Odaira, R., Nakaike, T., Inagaki, T., Komatsu, H., Nakatani, T.: Coloring-based coalescing for graph coloring register allocation. In: IEEE\/ACM International Symposium on Code Generation & Optimization, pp. 160\u2013169 (2010)","DOI":"10.1145\/1772954.1772978"},{"key":"54_CR23","doi-asserted-by":"crossref","unstructured":"Ohama, Y., Yotsuyanagi, H., Hashizume, M., Higami, Y., Takahashi, H.: On selection of adjacent lines in test pattern generation for delay faults considering crosstalk effects. In: International Symposium on Communications and Information Technologies, pp. 1\u20135 (2017)","DOI":"10.1109\/ISCIT.2017.8261186"},{"key":"54_CR24","doi-asserted-by":"crossref","unstructured":"Park, J., Xu, X., Jin, Y., Forte, D., Tehranipoor, M.: Power-based side-channel instruction-level disassembler. In: IEEE 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC), pp. 1\u20136 (2018)","DOI":"10.1109\/DAC.2018.8465848"},{"issue":"5","key":"54_CR25","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1145\/330249.330250","volume":"21","author":"M Poletto","year":"1999","unstructured":"Poletto, M., Sarkar, A.V.: Linear scan register allocation. ACM Trans. Program. Lang. Syst. (TOPLAS) 21(5), 895\u2013913 (1999)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"issue":"1","key":"54_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.micpro.2017.01.003","volume":"50","author":"Z Shirmohammadi","year":"2017","unstructured":"Shirmohammadi, Z., Mozafari, F., Miremadi, S.G.: An efficient numerical-based crosstalk avoidance codec design for NoCs. Microprocess. Microsyst. 50(1), 127\u2013137 (2017)","journal-title":"Microprocess. Microsyst."},{"key":"54_CR27","doi-asserted-by":"crossref","unstructured":"Shirmohammadi, Z., Sabzi, H.Z.: DR: overhead efficient RLC crosstalk avoidance code. In: International Conference on Computer and Knowledge Engineering, pp. 1\u20136 (2018)","DOI":"10.1109\/ICCKE.2018.8566456"},{"issue":"5","key":"54_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3126524","volume":"16","author":"X Su","year":"2017","unstructured":"Su, X., Wu, H., Xue, J.: An efficient WCET-aware instruction scheduling and register Al-location approach for clustered VLIW processors. ACM Trans. Embed. Comput. Syst. 16(5), 1\u201321 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06794-5_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T12:18:53Z","timestamp":1657714733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06794-5_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067938","9783031067945"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06794-5_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Adaptive and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icais2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}