{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:01Z","timestamp":1772164021995,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T00:00:00Z","timestamp":1339372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,11]]},"DOI":"10.1145\/2254064.2254076","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T09:03:31Z","timestamp":1339405411000},"page":"89-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Input-sensitive profiling"],"prefix":"10.1145","author":[{"given":"Emilio","family":"Coppa","sequence":"first","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"given":"Camil","family":"Demetrescu","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"given":"Irene","family":"Finocchi","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2012,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(80)90022-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/258916.258924"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/243846.243857"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268958"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.28"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297035"},{"key":"e_1_3_2_1_8_1","volume-title":"September","author":"Bryant R. E.","year":"2011","unstructured":"R. E. Bryant . Personal communication , September 2011 . R. E. Bryant. Personal communication, September 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"Pearson Education","author":"Bryant R. E.","year":"2010","unstructured":"R. E. Bryant and D. R. O'Hallaron . Computer Systems : A Programmer's Perspective . Pearson Education , 2010 . R. E. Bryant and D. R. O'Hallaron. Computer Systems: A Programmer's Perspective. Pearson Education, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/37888.37890"},{"key":"e_1_3_2_1_11_1","volume-title":"Graphical Methods for Data Analysis","author":"Chambers J. M.","year":"1983","unstructured":"J. M. Chambers , W. S. Cleveland , B. Kleiner , and P. A. Tukey . Graphical Methods for Data Analysis . Chapman and Hall , New York , 1983 . J. M. Chambers, W. S. Cleveland, B. Kleiner, and P. A. Tukey. Graphical Methods for Data Analysis. Chapman and Hall, New York, 1983."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1404014.1404015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993559"},{"key":"e_1_3_2_1_14_1","volume-title":"Algorithm engineering. Bulletin of the EATCS (algorithmics column), 79: 48--63","author":"Demetrescu C.","year":"2003","unstructured":"C. Demetrescu , I. Finocchi , and G. F. Italiano . Algorithm engineering. Bulletin of the EATCS (algorithmics column), 79: 48--63 , 2003 . C. Demetrescu, I. Finocchi, and G. F. Italiano. Algorithm engineering. Bulletin of the EATCS (algorithmics column), 79: 48--63, 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"Fedora Project. wf: simple word frequency counter. http:\/\/ rpmfind.net\/\/linux\/RPM\/fedora\/devel\/rawhide\/src\/w\/wf-0.41-6.fc17.src.html.  Fedora Project. wf: simple word frequency counter. http:\/\/ rpmfind.net\/\/linux\/RPM\/fedora\/devel\/rawhide\/src\/w\/wf-0.41-6.fc17.src.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1088149.1088161"},{"key":"e_1_3_2_1_17_1","unstructured":"Genome bioinformatics research laboratory. Resources and datasets. http:\/\/genome.crg.es\/main\/databases.html.  Genome bioinformatics research laboratory. Resources and datasets. http:\/\/genome.crg.es\/main\/databases.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287681"},{"key":"e_1_3_2_1_19_1","first-page":"49","volume-title":"Best of PLDI","author":"Graham S. L.","year":"1982","unstructured":"S. L. Graham , P. B. Kessler , and M. K. McKusick . gprof: a call graph execution profiler (with retrospective) . In K. S. McKinley, editor, Best of PLDI , pages 49 -- 57 . ACM , 1982 . S. L. Graham, P. B. Kessler, and M. K. McKusick. gprof: a call graph execution profiler (with retrospective). In K. S. McKinley, editor, Best of PLDI, pages 49--57. ACM, 1982."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.391375"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc.","author":"Hall R. J.","year":"1993","unstructured":"R. J. Hall and A. J. Goldberg . Call path profiling of monotonic program resources in UNIX . In Proc. Summer 1993 USENIX Technical Conference, pages 1--19. USENIX Association , 1993. R. J. Hall and A. J. Goldberg. Call path profiling of monotonic program resources in UNIX. In Proc. Summer 1993 USENIX Technical Conference, pages 1--19. USENIX Association, 1993."},{"key":"e_1_3_2_1_22_1","unstructured":"M. Hart. Gutenberg Project. http:\/\/www.gutenberg.org\/.  M. Hart. Gutenberg Project. http:\/\/www.gutenberg.org\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. 4th ACM Workshop on Feedback-Directed and Dynamic Optimization","author":"Hirzel M.","year":"2001","unstructured":"M. Hirzel and T. Chilimbi . Bursty tracing: A framework for low-overhead temporal profiling . In Proc. 4th ACM Workshop on Feedback-Directed and Dynamic Optimization , 2001 . M. Hirzel and T. Chilimbi. Bursty tracing: A framework for low-overhead temporal profiling. In Proc. 4th ACM Workshop on Feedback-Directed and Dynamic Optimization, 2001."},{"key":"e_1_3_2_1_25_1","first-page":"215","volume-title":"Data Structures, Near Neighbor Searches, and Methodology","author":"Johnson D.","year":"2002","unstructured":"D. Johnson . A theoretician's guide to the experimental analysis of algorithms. In Data Structures, Near Neighbor Searches, and Methodology , pages 215 -- 250 . American Mathematical Society , 2002 . D. Johnson. A theoretician's guide to the experimental analysis of algorithms. In Data Structures, Near Neighbor Searches, and Methodology, pages 215--250. American Mathematical Society, 2002."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977660"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01951942"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1884795.1884819"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005691"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297797.1297818"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/857152.857158"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/647475.727620"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1090\/dimacs\/059\/10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339419"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380180506"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.11"},{"key":"e_1_3_2_1_38_1","first-page":"17","volume-title":"USENIX Annual Technical Conference","author":"Seward J.","year":"2005","unstructured":"J. Seward and N. Nethercote . Using Valgrind to detect undefined value errors with bit-precision . In USENIX Annual Technical Conference , pages 17 -- 30 . USENIX, 2005 . J. Seward and N. Nethercote. Using Valgrind to detect undefined value errors with bit-precision. In USENIX Annual Technical Conference, pages 17--30. USENIX, 2005."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.562"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/321879.321884"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190268"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24688-6_58"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/337449.337483"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"e_1_3_2_1_45_1","unstructured":"T. Williams and C. Kelley. Gnuplot: command-driven interactive function plotting program. http:\/\/www.gnuplot.info\/.  T. Williams and C. Kelley. Gnuplot: command-driven interactive function plotting program. http:\/\/www.gnuplot.info\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134012"}],"event":{"name":"PLDI '12: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Beijing China","acronym":"PLDI '12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2254064.2254076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2254064.2254076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:00:38Z","timestamp":1750262438000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2254064.2254076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,11]]},"references-count":46,"alternative-id":["10.1145\/2254064.2254076","10.1145\/2254064"],"URL":"https:\/\/doi.org\/10.1145\/2254064.2254076","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2345156.2254076","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,6,11]]},"assertion":[{"value":"2012-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}