{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:20:25Z","timestamp":1729642825726,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cgo.2011.5764681","type":"proceedings-article","created":{"date-parts":[[2011,5,9]],"date-time":"2011-05-09T20:40:43Z","timestamp":1304973643000},"page":"130-140","source":"Crossref","is-referenced-by-count":3,"title":["Automatic parallelization of fine-grained meta-functions on a chip multiprocessor"],"prefix":"10.1109","author":[{"given":"Sanghoon","family":"Lee","sequence":"first","affiliation":[]},{"given":"James","family":"Tuck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1145\/1028176.1006720","article-title":"iWatcher: Efficient Architectural Support for Software Debugging","author":"zhou","year":"2004","journal-title":"Proc of the 31 st International Symposium on Computer Ar-chitecture"},{"key":"ref38","article-title":"AccMon: Automatically Detecting Memory-related Bugs via Program Counter-Bsased Invariants","author":"zhou","year":"2004","journal-title":"Proc of the 37th International Symposium on MicroAsrchitecture)"},{"journal-title":"GNU Compiler Collection","year":"2008","author":"team","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60385-9_2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1147\/rd.502.0261"},{"key":"ref30","first-page":"2","article-title":"Using valgrind to detect undefined value errors with bit-precision","author":"seward","year":"2005","journal-title":"Proc of the Annual Conference on USENIX Annual Technical Conference"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542333"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.75"},{"journal-title":"The Valgrind Quick Start Guide","year":"2005","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470428"},{"journal-title":"SESC","year":"2004","author":"renau","key":"ref10"},{"journal-title":"Intel Thread Checker","year":"2004","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168884"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45314-8_16","article-title":"Debugging via Run-Time Type Checking","volume":"2029","author":"loginov","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/379240.379250"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060297"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"ref18","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc of the 12th Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1353536.1346321"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref4","first-page":"63","article-title":"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks","author":"cowan","year":"1998","journal-title":"Proc of the 7th USENIX Security Symposium"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2001.903250"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945468"},{"journal-title":"Valgrind an open-source memory debugger for x86-gnu\/linux","year":"2004","author":"seward","key":"ref29"},{"key":"ref5","article-title":"Mudflap: Pointer use checking for C\/C++","author":"eigler","year":"2003","journal-title":"Proc of the GCC Developers Summit"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/581376.581377"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605417"},{"key":"ref22","article-title":"Efficient Run-time Monitoring Using Shadow Processing","author":"patil","year":"1995","journal-title":"Proc Intl Work on Automated and Algorithmic Debugging"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199701)27:1<87::AID-SPE78>3.0.CO;2-P"},{"key":"ref24","article-title":"SafeMem: Exploiting ECC Memory for Detecting Memory Leaks and Memory Corruption During Production Runs","author":"qin","year":"2005","journal-title":"Proceedings of the International Symposium on High-Performance Computer Architecture"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/362422.362468"},{"key":"ref26","article-title":"HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector","author":"shetty","year":"2004","journal-title":"Proc of IBM Watson Conference on Interaction between Architecture Circuits and Compilers (P=ac2)"},{"journal-title":"Purify","year":"2006","key":"ref25"}],"event":{"name":"2011 9th Annual IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2011,4,2]]},"location":"Chamonix, France","end":{"date-parts":[[2011,4,6]]}},"container-title":["International Symposium on Code Generation and Optimization (CGO 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5755493\/5764641\/05764681.pdf?arnumber=5764681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:57:00Z","timestamp":1497916620000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5764681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/cgo.2011.5764681","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}