{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:05:08Z","timestamp":1742378708019,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/pact.2003.1238012","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"159-169","source":"Crossref","is-referenced-by-count":14,"title":["Compressing extended program traces using value predictors"],"prefix":"10.1109","author":[{"given":"M.","family":"Burtscher","sequence":"first","affiliation":[]},{"family":"Metha Jeeradit","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/31846.42227"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1999.765957"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178260"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1997.645815"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378835"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214771"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659158"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1997.645819"},{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.1994.504117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/12.908991"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1998.727028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(85)90036-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380201205"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301678"},{"key":"ref28","first-page":"89","article-title":"Mache: No-Loss Trace Compaction","volume":"17","author":"samples","year":"1989","journal-title":"international conference on measurement and modeling of computer systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378840"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.1998.727186"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1017696"},{"key":"ref6","article-title":"ATOM: A Flexible Interface for Building High Performance Program Analysis Tools","author":"eustace","year":"1994","journal-title":"WRL Technical Note TN-44 Digital Western Research Laboratory"},{"key":"ref29","article-title":"Implementations of Context Based Value Predictors","author":"sazeides","year":"1997","journal-title":"University of Wisconsin-Madison Tech Rep ECETR-97-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/301453.301577"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2001.903264"},{"key":"ref7","article-title":"Speculative Execution Based on Value Prediction","author":"gabbay","year":"1996","journal-title":"EE Department Technical Report #1080 Technion - Israel Institute of Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.1999.807407"},{"year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/571666.571677"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1996.566464"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/40.2_and_3.103"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237173"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1997.581951"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1613\/jair.374","article-title":"Identifying Hierarchical Structure in Sequences: A linear-time algorithm","volume":"7","author":"neville-manning","year":"1997","journal-title":"Journal of Artificial Intelligence Research"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1998.742775"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/192724.192728","article-title":"Techniques for Compressing Program Address Traces","author":"pleszkun","year":"1994","journal-title":"Annual IEEE\/ACM International Symposium on Microarchitecture"}],"event":{"name":"12th International Conference on Parallel Architectures and Compilation Techniques. PACT 2003","acronym":"PACT-03","location":"New Orleans, LA, USA"},"container-title":["Oceans 2002 Conference and Exhibition. Conference Proceedings (Cat. No.02CH37362)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8771\/27774\/01238012.pdf?arnumber=1238012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T15:05:45Z","timestamp":1585667145000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/pact.2003.1238012","relation":{},"subject":[]}}