{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:45:00Z","timestamp":1725752700985},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cgo.2004.1281684","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"315-323","source":"Crossref","is-referenced-by-count":1,"title":["Exposing memory access regularities using object-relative memory profiling"],"prefix":"10.1109","author":[{"family":"Qiang Wu","sequence":"first","affiliation":[]},{"given":"A.","family":"Pyatakov","sequence":"additional","affiliation":[]},{"given":"A.","family":"Spiridonov","sequence":"additional","affiliation":[]},{"given":"E.","family":"Raman","sequence":"additional","affiliation":[]},{"given":"D.W.","family":"Clark","sequence":"additional","affiliation":[]},{"given":"D.I.","family":"August","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291036"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/859654.859657"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/512553.512554"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45574-4_19"},{"key":"3","article-title":"Using profile information to assist advanced compiler optimization and scheduling","author":"chen","year":"1992","journal-title":"Proceedings of the Fifth Workshop on Languages and Compilers for Parallel Computing"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512555"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/351397.351408"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378840"},{"key":"7","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1613\/jair.374","article-title":"Identifying hierarchical structure in sequences: A linear-time algorithm","author":"neyill-manning","year":"1997","journal-title":"J of Artificial Intelligence Research"},{"journal-title":"Memory Profiling for Directing Data Speculative Optimizations and Scheduling","year":"1997","author":"connors","key":"6"},{"key":"5","article-title":"Characterization of repeating data access patterns in integer benchmarks","author":"nystrom","year":"2001","journal-title":"Proceedings of the 28th International Symposium on Computer Architecture"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503287"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/509705.509708"},{"key":"8","first-page":"1","article-title":"An overview of the Intel IA-64 compiler","author":"dulong","year":"1999","journal-title":"Intel Technology Journal Q4 1999"}],"event":{"name":"International Symposium on Code Generation and Optimization, 2004. CGO 2004.","location":"San Jose, CA, USA"},"container-title":["International Symposium on Code Generation and Optimization, 2004. CGO 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9012\/28612\/01281684.pdf?arnumber=1281684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T11:29:54Z","timestamp":1585826994000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1281684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cgo.2004.1281684","relation":{},"subject":[]}}