{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T23:04:05Z","timestamp":1695683045759},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,10,12]],"date-time":"2013-10-12T00:00:00Z","timestamp":1381536000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10586-013-0307-2","type":"journal-article","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T17:37:09Z","timestamp":1381513029000},"page":"1-14","source":"Crossref","is-referenced-by-count":9,"title":["PEBIL: binary instrumentation for practical data-intensive program analysis"],"prefix":"10.1007","volume":"18","author":[{"given":"Michael A.","family":"Laurenzano","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joshua","family":"Peraza","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laura","family":"Carrington","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ananta","family":"Tiwari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"Jr","given":"William A.","family":"Ward","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roy","family":"Campbell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,10,12]]},"reference":[{"issue":"1","key":"307_CR1","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1145\/239912.239923","volume":"19","author":"B. Calder","year":"1997","unstructured":"Calder, B., Grunwald, D., Jones, M., Lindsay, D., Martin, J., Mozer, M., Zorn, B.: Evidence-based static branch prediction using machine learning. ACM Trans. Program. Lang. Syst. 19(1), 188\u2013222 (1997)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"307_CR2","first-page":"28","volume-title":"Proceedings of the Fourth Annual Workshop on Modeling, Benchmarking and Simulation","author":"A. Jaleel","year":"2008","unstructured":"Jaleel, A., Cohn, R., Luk, C.K., Jacob, B.: CMP$im: a Pin-based on-the-fly multi-core cache simulator. In: Proceedings of the Fourth Annual Workshop on Modeling, Benchmarking and Simulation, pp. 28\u201336 (2008)"},{"key":"307_CR3","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/IPPS.1994.288304","volume-title":"Proceedings of the Eigth International Parallel Processing Symposium","author":"J. Pierce","year":"1994","unstructured":"Pierce, J., Mudge, T.: The effect of speculative execution on cache performance. In: Proceedings of the Eigth International Parallel Processing Symposium, pp. 172\u2013179. IEEE, New York (1994)"},{"key":"307_CR4","first-page":"167","volume-title":"European Conference on Parallel Processing","author":"L. DeRose","year":"2002","unstructured":"DeRose, L., Wolf, F.: CATCH\u2014a call-graph based automatic tool for capture of hardware performance metrics for MPI and OpenMP applications. In: European Conference on Parallel Processing, pp. 167\u2013176 (2002)"},{"key":"307_CR5","first-page":"17","volume-title":"USENIX Annual Technical Conference","author":"J. Seward","year":"2005","unstructured":"Seward, J., Nethercote, N.: Using Valgrind to detect undefined value errors with bit-precision. In: USENIX Annual Technical Conference, pp. 17\u201330 (2005)"},{"key":"307_CR6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1356058.1356069","volume-title":"Proceedings of the 6th Annual IEEE\/ACM International Symposium on Code Generation and Optimization","author":"P. Saxena","year":"2008","unstructured":"Saxena, P., Sekar, R., Puranik, V.: Efficient fine-grained binary instrumentation with applications to taint-tracking. In: Proceedings of the 6th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, pp. 74\u201383. ACM, New York (2008)"},{"issue":"2","key":"307_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S1571-0661(04)81047-8","volume":"89","author":"N. Nethercote","year":"2003","unstructured":"Nethercote, N., Mycroft, A.: Redux: a dynamic dataflow tracer. Electron. Notes Theor. Comput. Sci. 89(2), 149\u2013170 (2003)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"307_CR8","first-page":"1","volume-title":"Proceedings of the 10th Annual International Symposium on Code Generation and Optimization","author":"L. Tang","year":"2012","unstructured":"Tang, L., Mars, J., Soffa, M.L.: Compiling for niceness: mitigating contention for QoS in warehouse scale computers. In: Proceedings of the 10th Annual International Symposium on Code Generation and Optimization, pp. 1\u201312. ACM, New York (2012)"},{"key":"307_CR9","first-page":"21","volume-title":"A Framework for Performance Modeling and Prediction","author":"A. Snavely","year":"2002","unstructured":"Snavely, A., Carrington, L., Wolter, N., Labarta, J., Badia, R., Purkayastha, A.: A Framework for Performance Modeling and Prediction, pp. 21. IEEE, New York (2002)"},{"key":"307_CR10","first-page":"79","volume-title":"European Conference on Parallel Processing","author":"M.A. Laurenzano","year":"2011","unstructured":"Laurenzano, M.A., Meswani, M., Carrington, L., Snavely, A., Tikir, M., Poole, S.: Reducing energy usage with memory and computation-aware dynamic frequency scaling. In: European Conference on Parallel Processing, pp. 79\u201390 (2011)"},{"key":"307_CR11","first-page":"990","volume-title":"26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum","author":"A. Tiwari","year":"2012","unstructured":"Tiwari, A., Laurenzano, M.A., Carrington, L., Snavely, A.: Modeling power and energy usage of hpc kernels. In: 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, pp. 990\u2013998. IEEE, New York (2012)"},{"key":"307_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/1791194.1791203","volume-title":"Proceedings of the Workshop on Binary Instrumentation and Applications","author":"K. Serebryany","year":"2009","unstructured":"Serebryany, K., Iskhodzhanov, T.: ThreadSanitizer: data race detection in practice. In: Proceedings of the Workshop on Binary Instrumentation and Applications, pp. 62\u201371. ACM, New York (2009)"},{"key":"307_CR13","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1145\/1995896.1995928","volume-title":"Proceedings of the International Conference on Supercomputing","author":"L. Carrington","year":"2011","unstructured":"Carrington, L., Tikir, M.M., Olschanowsky, C., Laurenzano, M.A., Peraza, J., Snavely, A., Poole, S.: An idiom-finding tool for increasing productivity of accelerators. In: Proceedings of the International Conference on Supercomputing, pp. 202\u2013212. ACM, New York (2011)"},{"key":"307_CR14","first-page":"86","volume-title":"ACM SIGSOFT Software Engineering Notes","author":"M.M. Tikir","year":"2002","unstructured":"Tikir, M.M., Hollingsworth, J.K.: Efficient instrumentation for code coverage testing. In: ACM SIGSOFT Software Engineering Notes, vol. 27, pp. 86\u201396. ACM, New York (2002)"},{"issue":"2","key":"307_CR15","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TDSC.2008.62","volume":"6","author":"A. Shye","year":"2009","unstructured":"Shye, A., Blomstedt, J., Moseley, T., Reddi, V.J., Connors, D.A.: Plr: a software approach to transient fault tolerance for multicore architectures. IEEE Trans. Dependable Secure Comput. 6(2), 135\u2013148 (2009)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"02n03","key":"307_CR16","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1142\/S0129626401000579","volume":"11","author":"B.P. Miller","year":"2001","unstructured":"Miller, B.P., Christodorescu, M., Iverson, R., Kosar, T., Mirgorodskii, A., Popovici, F.: Playing inside the black box: using dynamic instrumentation to create security holes. Parallel Process. Lett. 11(02n03), 267\u2013280 (2001)","journal-title":"Parallel Process. Lett."},{"key":"307_CR17","first-page":"211","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"M. Prasad","year":"2003","unstructured":"Prasad, M., Chiueh, T.: A\u00a0binary rewriting defense against stack based buffer overflow attacks. In: Proceedings of the USENIX Annual Technical Conference, pp. 211\u2013224 (2003)"},{"key":"307_CR18","first-page":"175","volume-title":"International Symposium on Performance Analysis of Systems & Software","author":"M.A. Laurenzano","year":"2010","unstructured":"Laurenzano, M.A., Tikir, M.M., Carrington, L., Snavely, A.: PEBIL: efficient static binary instrumentation for Linux. In: International Symposium on Performance Analysis of Systems & Software, pp. 175\u2013183. IEEE, New York (2010)"},{"key":"307_CR19","first-page":"190","volume-title":"ACM SIGPLAN Notices","author":"C.K. Luk","year":"2005","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: ACM SIGPLAN Notices, vol. 40, pp. 190\u2013200. ACM, New York (2005)"},{"issue":"4","key":"307_CR20","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1177\/109434200001400404","volume":"14","author":"B. Buck","year":"2000","unstructured":"Buck, B., Hollingsworth, J.K.: An API for runtime code patching. Int. J. High Perform. Comput. Appl. 14(4), 317\u2013329 (2000)","journal-title":"Int. J. High Perform. Comput. Appl."},{"issue":"6","key":"307_CR21","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/12.286300","volume":"43","author":"R.E. Kessler","year":"1994","unstructured":"Kessler, R.E., Hill, M.D., Wood, D.A.: A\u00a0comparison of trace-sampling techniques for multi-megabyte caches. IEEE Trans. Comput. 43(6), 664\u2013675 (1994)","journal-title":"IEEE Trans. Comput."},{"key":"307_CR22","doi-asserted-by":"crossref","unstructured":"Carrington, L., Snavely, A., Gao, X., Wolter, N.: A\u00a0performance prediction framework for scientific applications. Comput. Sci., 701 (2003)","DOI":"10.1007\/3-540-44863-2_91"},{"key":"307_CR23","unstructured":"Smith, M.D.: Tracing with pixie. Computer Systems Laboratory, Stanford University (1991)"},{"issue":"2","key":"307_CR24","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1002\/spe.4380240204","volume":"24","author":"J.R. Larus","year":"1994","unstructured":"Larus, J.R., Ball, T.: Rewriting executable files to measure program behavior. Softw. Pract. Exp. 24(2), 197\u2013218 (1994)","journal-title":"Softw. Pract. Exp."},{"key":"307_CR25","first-page":"291","volume-title":"ACM Sigplan Notices","author":"J.R. Larus","year":"1995","unstructured":"Larus, J.R., Schnarr, E.: Eel: machine-independent executable editing. In: ACM Sigplan Notices, vol. 30, pp. 291\u2013300. ACM, New York (1995)"},{"key":"307_CR26","volume-title":"ATOM: A System for Building Customized Program Analysis Tools","author":"A. Srivastava","year":"1994","unstructured":"Srivastava, A., Eustace, A.: ATOM: A System for Building Customized Program Analysis Tools, vol. 29. ACM, New York (1994)"},{"key":"307_CR27","volume-title":"Workshop on Binary Instrumentation and Applications","author":"M.M. Tikir","year":"2006","unstructured":"Tikir, M.M., Laurenzano, M.A., Carrington, L., Snavely, A.: The pmac binary instrumentation library for PowerPC\/AIX. In: Workshop on Binary Instrumentation and Applications (2006)"},{"issue":"6","key":"307_CR28","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N. Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM SIGPLAN Not. 42(6), 89\u2013100 (2007)","journal-title":"ACM SIGPLAN Not."},{"key":"307_CR29","volume-title":"4th ACM Workshop on Feedback-Directed and Dynamic Optimization","author":"D. Bruening","year":"2001","unstructured":"Bruening, D., Duesterwald, E., Amarasinghe, S.: Design and implementation of a dynamic optimization framework for windows. In: 4th ACM Workshop on Feedback-Directed and Dynamic Optimization (2001)"},{"key":"307_CR30","first-page":"133","volume-title":"ACM SIGPLAN Notices","author":"D. Bruening","year":"2012","unstructured":"Bruening, D., Zhao, Q., Amarasinghe, S.: Transparent dynamic instrumentation. In: ACM SIGPLAN Notices, vol. 47, pp. 133\u2013144. ACM, New York (2012)"},{"key":"307_CR31","volume-title":"International Workshop on Data-Intensive Scalable Computing Systems","author":"M.A. Laurenzano","year":"2012","unstructured":"Laurenzano, M.A., Peraza, J., Carrington, L., Tiwari, A., Ward, W.A., Campbell, R.: A\u00a0static binary instrumentation threading model for fast memory trace collection. In: International Workshop on Data-Intensive Scalable Computing Systems (2012)"},{"key":"307_CR32","first-page":"15","volume-title":"International Symposium on Code Generation and Optimization","author":"C.K. Luk","year":"2004","unstructured":"Luk, C.K., Muth, R., Patil, H., Cohn, R., Lowney, G.: Ispike: a post-link optimizer for the Intel\u00ae Itanium\u00ae architecture. In: International Symposium on Code Generation and Optimization, pp. 15\u201326. IEEE, New York (2004)"},{"key":"307_CR33","first-page":"158","volume-title":"The ACM\/IEEE Conference on Supercomputing","author":"D.H. Bailey","year":"1991","unstructured":"Bailey, D.H., Barszcz, E., Barton, J.T., Browning, D.S., Carter, R.L., Dagum, L., Fatoohi, R.A., Frederickson, P.O., Lasinski, T.A., Schreiber, R.S., Simon, H.D., Venkatakrishnan, V., Weeratunga, S.K.: The NAS parallel benchmarks\u2014summary and preliminary results. In: The ACM\/IEEE Conference on Supercomputing, pp. 158\u2013165 (1991)"},{"issue":"9","key":"307_CR34","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1093\/bioinformatics\/14.9.755","volume":"14","author":"S.R. Eddy","year":"1998","unstructured":"Eddy, S.R.: Profile hidden Markov models. Bioinformatics 14(9), 755\u2013763 (1998)","journal-title":"Bioinformatics"},{"issue":"12","key":"307_CR35","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1002\/spe.4380211204","volume":"21","author":"P.P. Chang","year":"1991","unstructured":"Chang, P.P., Mahlke, S.A., Hwu, W.M.W.: Using profile information to assist classic code optimizations. Softw. Pract. Exp. 21(12), 1301\u20131321 (1991)","journal-title":"Softw. Pract. Exp."},{"key":"307_CR36","volume-title":"Predicting Program Behavior Using Real or Estimated Profiles","author":"D.W. Wall","year":"1991","unstructured":"Wall, D.W.: Predicting Program Behavior Using Real or Estimated Profiles, vol. 26. ACM, New York (1991)"},{"key":"307_CR37","first-page":"456","volume-title":"Proceedings of the 32nd Annual ACM\/IEEE Design Automation Conference","author":"Y.T.S. Li","year":"1995","unstructured":"Li, Y.T.S., Malik, S.: Performance analysis of embedded software using implicit path enumeration. In: Proceedings of the 32nd Annual ACM\/IEEE Design Automation Conference, pp. 456\u2013461. ACM, New York (1995)"},{"key":"307_CR38","first-page":"149","volume-title":"IEEE International Workshop on Workload Characterization","author":"A. Snavely","year":"2001","unstructured":"Snavely, A., Wolter, N., Carrington, L.: Modeling application performance by convolving machine signatures with application profiles. In: IEEE International Workshop on Workload Characterization, pp. 149\u2013156. IEEE, New York (2001)"},{"key":"307_CR39","first-page":"45","volume-title":"ACM SIGARCH Computer Architecture News","author":"T. Sherwood","year":"2002","unstructured":"Sherwood, T., Perelman, E., Hamerly, G., Calder, B.: Automatically characterizing large scale program behavior. In: ACM SIGARCH Computer Architecture News, vol. 30, pp. 45\u201357. ACM, New York (2002)"},{"key":"307_CR40","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2024569.2024572","volume-title":"Proceedings of the 10th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools","author":"A.R. Bernat","year":"2011","unstructured":"Bernat, A.R., Miller, B.P.: Anywhere, any-time binary instrumentation. In: Proceedings of the 10th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools, pp. 9\u201316. ACM, New York (2011)"},{"issue":"3","key":"307_CR41","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1145\/128738.128740","volume":"9","author":"W.H. Wang","year":"1991","unstructured":"Wang, W.H., Baer, J.L.: Efficient trace-driven simulation methods for cache performance analysis. ACM Trans. Comput. Syst. 9(3), 222\u2013241 (1991)","journal-title":"ACM Trans. Comput. Syst."},{"key":"307_CR42","unstructured":"Ding, C., Zhong, Y.: Reuse distance analysis. University of Rochester, Rochester, NY (2001)"},{"key":"307_CR43","first-page":"245","volume-title":"ACM SIGPLAN Notices","author":"C. Ding","year":"2003","unstructured":"Ding, C., Zhong, Y.: Predicting whole-program locality through reuse distance analysis. In: ACM SIGPLAN Notices, vol. 38, pp. 245\u2013257. ACM, New York (2003)"},{"key":"307_CR44","first-page":"50","volume-title":"Proceedings of the ACM\/IEEE Conference on Supercomputing","author":"J. Weinberg","year":"2005","unstructured":"Weinberg, J., McCracken, M.O., Strohmaier, E., Snavely, A.: Quantifying locality in the memory access patterns of hpc applications. In: Proceedings of the ACM\/IEEE Conference on Supercomputing, p. 50. IEEE, New York (2005)"},{"key":"307_CR45","first-page":"99","volume-title":"IEEE International Workshop on Workload Characterization","author":"A. Milenkovic","year":"2003","unstructured":"Milenkovic, A., Milenkovic, M.: Exploiting streams in instruction and data address trace compression. In: IEEE International Workshop on Workload Characterization, pp. 99\u2013107. IEEE, New York (2003)"},{"key":"307_CR46","doi-asserted-by":"crossref","unstructured":"Olschanowsky, C., Tikir, M.M., Carrington, L., Snavely, A.: PSnAP: accurate synthetic address streams through memory profiles. Languages and Compilers for Parallel Computing, 353\u2013367 (2010)","DOI":"10.1007\/978-3-642-13374-9_24"},{"issue":"6","key":"307_CR47","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/12.689650","volume":"47","author":"T.M. Conte","year":"1998","unstructured":"Conte, T.M., Hirsch, M.A., Hwu, W.M.W.: Combining trace sampling with single pass methods for efficient cache simulation. IEEE Trans. Comput. 47(6), 714\u2013720 (1998)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"307_CR48","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1127577.1127593","volume":"33","author":"M.A. Laurenzano","year":"2005","unstructured":"Laurenzano, M.A., Simon, B., Snavely, A., Gunn, M.: Low cost trace-driven memory simulation using SimPoint. ACM SIGARCH Comput. Archit. News 33(5), 81\u201386 (2005)","journal-title":"ACM SIGARCH Comput. Archit. News"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0307-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-013-0307-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0307-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-013-0307-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T21:14:16Z","timestamp":1646774056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-013-0307-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,12]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1007\/s10586-013-0307-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,12]]}}}