{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:31:20Z","timestamp":1729657880091,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2003.1238045","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"193-202","source":"Crossref","is-referenced-by-count":3,"title":["Checking program profiles"],"prefix":"10.1109","author":[{"given":"P.","family":"Moseley","sequence":"first","affiliation":[]},{"given":"S.","family":"Debray","sequence":"additional","affiliation":[]},{"given":"G.","family":"Andrews","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Design and analysis of profile-based optimization in Compaq's compilation tools for Al-pha","volume":"2","author":"cohn","year":"2000","journal-title":"Journal of Instruction Level Parallelism"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512542"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/800230.806987"},{"key":"ref13","article-title":"Bursty tracing: A framework for low-overhead temporal profiling","author":"hirzel","year":"2001","journal-title":"Proc Fourth Workshop Feedback-Directed and Dynamic Optimizations"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178478"},{"journal-title":"Software Engineering and Technology Functional Program Testing","year":"1987","author":"howden","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380240204"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1049\/sej.1989.0012","article-title":"testing in the program development cycle","volume":"4","author":"laski","year":"1989","journal-title":"Software Engineering Journal"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45306-7_4"},{"key":"ref19","first-page":"340","article-title":"Code specialization based on value profiles","author":"muth","year":"2000","journal-title":"Proceedings of the 7th International Static Analysis Symposium (SAS'00)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1996.566449"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/183432.183527"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211204"},{"key":"ref5","article-title":"Value profiling and optimization","volume":"1","author":"calder","year":"1999","journal-title":"Journal of Instruction Level Parallelism"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1989.714448"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02577873"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MICRO.1996.566452","article-title":"Hot cold optimization of large Windows\/NT applications","author":"cohn","year":"1996","journal-title":"Proc 29th Annual International Symposium on Microarchitecture"},{"journal-title":"ald an assembly language debugger","year":"0","author":"aiken","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93550"},{"journal-title":"How Debuggers Work Algorithms Data Structures and Architecture","year":"1996","author":"rosenberg","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/256428.167076"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173063"},{"key":"ref23","article-title":"PIto: A link-time optimizer for the Intel IA-32 architecture","author":"schwarz","year":"2001","journal-title":"Proc 2001 Workshop Binary Translation (WBT '01)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45306-7_22"},{"key":"ref25","first-page":"196","article-title":"ATOM-A system for building customized program analysis tools","author":"srivastava","year":"1994","journal-title":"Proc ACM SIG-PLAN'94 Conference on Programming Language Design and Implementation (PLDI)"}],"event":{"name":"Third IEEE International Workshop on Source Code Analysis and Manipulation.","acronym":"SCAM-03","location":"Amsterdam, Netherlands"},"container-title":["Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8773\/27776\/01238045.pdf?arnumber=1238045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:05:28Z","timestamp":1497571528000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/scam.2003.1238045","relation":{},"subject":[]}}