{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:30Z","timestamp":1772163990282,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,2,24]],"date-time":"2014-02-24T00:00:00Z","timestamp":1393200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,24]]},"DOI":"10.1145\/2541940.2541980","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T08:21:11Z","timestamp":1393316471000},"page":"639-652","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Post-compiler software optimization for reducing energy"],"prefix":"10.1145","author":[{"given":"Eric","family":"Schulte","sequence":"first","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Jonathan","family":"Dorn","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Stephen","family":"Harding","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332842"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. HotOS XIII","author":"David","year":"2011","unstructured":"David H. Ackley and Daniel C. Cannon. Pursue robust indefinite scalability . Proc. HotOS XIII , Napa Valley, California, USA , 2011 . David H. Ackley and Daniel C. Cannon. Pursue robust indefinite scalability. Proc. HotOS XIII, Napa Valley, California, USA, 2011."},{"key":"e_1_3_2_1_3_1","volume-title":"Compilers: Principles, Techniques and Tools","author":"Aho Alfred","year":"1986","unstructured":"Alfred Aho , Ravi Sethi , and Jeffrey Ullman . Compilers: Principles, Techniques and Tools . Addison Wesley , 1986 . Alfred Aho, Ravi Sethi, and Jeffrey Ullman. Compilers: Principles, Techniques and Tools. Addison Wesley, 1986."},{"key":"e_1_3_2_1_4_1","first-page":"264","volume-title":"ICGA","author":"Angeline Peter J","year":"1993","unstructured":"Peter J Angeline and Jordan B Pollack . Competitive environments evolve better solutions for complex tasks . In ICGA , pages 264 -- 270 , 1993 . Peter J Angeline and Jordan B Pollack. Competitive environments evolve better solutions for complex tasks. In ICGA, pages 264--270, 1993."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542481"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806620"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"e_1_3_2_1_8_1","volume-title":"AAAI 2008 Fall Symposium \"Naturally-Inspired Artificial Intelligence\"","author":"Beal J.","year":"2008","unstructured":"J. Beal and Gerald Jay Sussman . Engineered robustness by controlled hallucination . In AAAI 2008 Fall Symposium \"Naturally-Inspired Artificial Intelligence\" , November 2008 . J. Beal and Gerald Jay Sussman. Engineered robustness by controlled hallucination. In AAAI 2008 Fall Symposium \"Naturally-Inspired Artificial Intelligence\", November 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/339647.339657"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254086"},{"key":"e_1_3_2_1_12_1","volume-title":"A primer of ecological genetics","author":"Conner Jeffrey K","year":"2004","unstructured":"Jeffrey K Conner and Daniel L Hartl . A primer of ecological genetics . Sinauer Associates Incorporated , 2004 . Jeffrey K Conner and Daniel L Hartl. A primer of ecological genetics. Sinauer Associates Incorporated, 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"On the origin of species","author":"Darwin Charles","year":"1859","unstructured":"Charles Darwin . On the origin of species , volume 484 . John Murray , London , 1859 . Charles Darwin. On the origin of species, volume 484. John Murray, London, 1859."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.48"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.93"},{"key":"e_1_3_2_1_17_1","first-page":"1381","volume-title":"Speech and Signal Processing","volume":"3","author":"Frigo M.","year":"1998","unstructured":"M. Frigo and S.G. Johnson . FFTW: An adaptive software architecture for the FFT. In Acoustics , Speech and Signal Processing , volume 3 , pages 1381 -- 1384 , 1998 . M. Frigo and S.G. Johnson. FFTW: An adaptive software architecture for the FFT. In Acoustics, Speech and Signal Processing, volume 3, pages 1381--1384, 1998."},{"key":"e_1_3_2_1_18_1","volume-title":"Performance counters for Linux","author":"Gleixner Thomas","year":"2008","unstructured":"Thomas Gleixner . Performance counters for Linux , 2008 . http:\/\/lwn.net\/Articles\/310176\/. Thomas Gleixner. Performance counters for Linux, 2008. http:\/\/lwn.net\/Articles\/310176\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.45"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/800230.806987"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351678"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837853.1693507"},{"key":"e_1_3_2_1_24_1","first-page":"191","volume-title":"International Conference on Software Engineering","author":"Hutchins Monica","year":"1994","unstructured":"Monica Hutchins , Herb Foster , Tarak Goradia , and Thomas Ostrand . Experiments of the effectiveness of dataflow-and control flow-based test adequacy criteria . In International Conference on Software Engineering , pages 191 -- 200 , 1994 . Monica Hutchins, Herb Foster, Tarak Goradia, and Thomas Ostrand. Experiments of the effectiveness of dataflow-and control flow-based test adequacy criteria. In International Conference on Software Engineering, pages 191--200, 1994."},{"key":"e_1_3_2_1_25_1","volume-title":"Advanced Micro Devices Incorporated","author":"Devices Incorporated Advanced Micro","year":"2005","unstructured":"Advanced Micro Devices Incorporated . Software optimization guide for amd64 processors. Technical report , Advanced Micro Devices Incorporated , September 2005 . http:\/\/support.amd.com\/TechDocs\/25112.PDF. Advanced Micro Devices Incorporated. Software optimization guide for amd64 processors. Technical report, Advanced Micro Devices Incorporated, September 2005. http:\/\/support.amd.com\/TechDocs\/25112.PDF."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486893"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228523"},{"key":"e_1_3_2_1_28_1","volume-title":"Growth in data center electricity use 2005 to","author":"Koomey Jonathan","year":"2010","unstructured":"Jonathan Koomey . Growth in data center electricity use 2005 to 2010 . Oakland, CA : Analytics Press . August, 1: 2010, 2011. Jonathan Koomey. Growth in data center electricity use 2005 to 2010. Oakland, CA: Analytics Press. August, 1:2010, 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"Genetic Programming III: Darwinian Invention and Problem Solving. Morgan Kaufmann","author":"Koza John R.","year":"1999","unstructured":"John R. Koza , Forrest H. Bennett III, David Andrew , and Martin A . Keane . Genetic Programming III: Darwinian Invention and Problem Solving. Morgan Kaufmann , 1999 . John R. Koza, Forrest H. Bennett III, David Andrew, and Martin A. Keane. Genetic Programming III: Darwinian Invention and Problem Solving. Morgan Kaufmann, 1999."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/780731.780735"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.15"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277175"},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on Software Engineering","author":"Goues Claire Le","year":"2012","unstructured":"Claire Le Goues , Michael Dewey-Vogt , Stephanie Forrest , and Westley Weimer . A systematic study of automated program repair: Fixing 55 out of 105 bugs for$8 each . In International Conference on Software Engineering , 2012 . Claire Le Goues, Michael Dewey-Vogt, Stephanie Forrest, and Westley Weimer. A systematic study of automated program repair: Fixing 55 out of 105 bugs for$8 each. In International Conference on Software Engineering, 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/92.555992"},{"key":"e_1_3_2_1_36_1","volume-title":"Essentials of Metaheuristics. Lulu","author":"Luke Sean","year":"2013","unstructured":"Sean Luke . Essentials of Metaheuristics. Lulu , second edition, 2013 . http:\/\/cs.gmu.edu\/sean\/book\/metaheuristics\/. Sean Luke. Essentials of Metaheuristics. Lulu, second edition, 2013. http:\/\/cs.gmu.edu\/sean\/book\/metaheuristics\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/36205.36194"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Annual Technical Conf","author":"McCullough John C","year":"2011","unstructured":"John C McCullough , Yuvraj Agarwal , Jaideep Chandrashekar , Sathyanarayan Kuppuswamy , Alex C Snoeren , and Rajesh K Gupta . Evaluating the effectiveness of model-based power characterization . In USENIX Annual Technical Conf , 2011 . John C McCullough, Yuvraj Agarwal, Jaideep Chandrashekar, Sathyanarayan Kuppuswamy, Alex C Snoeren, and Rajesh K Gupta. Evaluating the effectiveness of model-based power characterization. In USENIX Annual Technical Conf, 2011."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041552.2041576"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508275"},{"key":"e_1_3_2_1_42_1","first-page":"772","volume-title":"International Conference on Sofware Engineering","author":"Thien Nguyen Hoang Duong","year":"2013","unstructured":"Hoang Duong Thien Nguyen , Dawei Qi , Abhik Roychoudhury , and Satish Chandra . SemFix : Program repair via semantic analysis . In International Conference on Sofware Engineering , pages 772 -- 781 , 2013 . Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, and Satish Chandra. SemFix: Program repair via semantic analysis. In International Conference on Sofware Engineering, pages 772--781, 2013."},{"issue":"11","key":"e_1_3_2_1_43_1","first-page":"1441","article-title":"powerpc system-on-a-chip with support for dynamic voltage scaling and dynamic frequency scaling. Solid-State Circuits","volume":"37","author":"Nowka Kevin J","year":"2002","unstructured":"Kevin J Nowka , Gary D Carpenter , Eric W MacDonald , Hung C Ngo , Bishop C Brock , Koji I Ishii , Tuyet Y Nguyen , and Jeffrey L Burns . A 32-bit powerpc system-on-a-chip with support for dynamic voltage scaling and dynamic frequency scaling. Solid-State Circuits , IEEE Journal of , 37 ( 11 ): 1441 -- 1447 , 2002 . Kevin J Nowka, Gary D Carpenter, Eric W MacDonald, Hung C Ngo, Bishop C Brock, Koji I Ishii, Tuyet Y Nguyen, and Jeffrey L Burns. A 32-bit powerpc system-on-a-chip with support for dynamic voltage scaling and dynamic frequency scaling. Solid-State Circuits, IEEE Journal of, 37(11):1441--1447, 2002.","journal-title":"IEEE Journal of"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2052622"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/93548.93550"},{"key":"e_1_3_2_1_46_1","volume-title":"A field guide to genetic programming","author":"Poli R.","year":"2008","unstructured":"R. Poli , W.B. Langdon , and N.F. McPhee . A field guide to genetic programming . Lulu Enterprises Uk Ltd , 2008 . R. Poli, W.B. Langdon, and N.F. McPhee. A field guide to genetic programming. Lulu Enterprises Uk Ltd, 2008."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1561\/1000000022"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949402"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1715759.1715775"},{"key":"e_1_3_2_1_50_1","volume-title":"Operating Systems Design and Implementation","author":"Rinard Martin","year":"2004","unstructured":"Martin Rinard , Cristian Cadar , Daniel Dumitran , Daniel M. Roy , Tudor Leu , and Jr. William S. Beebee . Enhancing server availability and security through failure-oblivious computing . In Operating Systems Design and Implementation , 2004 . Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and Jr. William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In Operating Systems Design and Implementation, 2004."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451150"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451151"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859059"},{"key":"e_1_3_2_1_54_1","first-page":"1","volume-title":"Genetic Programming and Evolvable Machines","author":"Schulte Eric","year":"2013","unstructured":"Eric Schulte , Zachary P. Fry , Ethan Fast , Westley Weimer , and Stephanie Forrest . Software mutational robustness . Genetic Programming and Evolvable Machines , pages 1 -- 32 , 2013 . Eric Schulte, ZacharyP. Fry, Ethan Fast, Westley Weimer, and Stephanie Forrest. Software mutational robustness. Genetic Programming and Evolvable Machines, pages 1--32, 2013."},{"key":"e_1_3_2_1_55_1","unstructured":"Eric Schulte Westley Weimer and Stephanie Forrest. Repairing security vulnerabilities in the netgear router binary. Computer Communications Review (submitted).  Eric Schulte Westley Weimer and Stephanie Forrest. Repairing security vulnerabilities in the netgear router binary. Computer Communications Review (submitted)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451124"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070781.2024186"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529382"},{"key":"e_1_3_2_1_61_1","volume-title":"Taking the redpill: Artificial evolution in native x86 systems. CoRR, abs\/1105.1534","author":"Sperl Thomas","year":"2011","unstructured":"Thomas Sperl . Taking the redpill: Artificial evolution in native x86 systems. CoRR, abs\/1105.1534 , 2011 . Thomas Sperl. Taking the redpill: Artificial evolution in native x86 systems. CoRR, abs\/1105.1534, 2011."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522318"},{"key":"e_1_3_2_1_63_1","first-page":"163","volume-title":"Operating Systems Design and Implementation","author":"Wang Xi","year":"2012","unstructured":"Xi Wang , Haogang Chen , Zhihao Jia , Nickolai Zeldovich , and M Frans Kaashoek . Improving integer security for systems with kint . In Operating Systems Design and Implementation , pages 163 -- 177 , 2012 . Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, and M Frans Kaashoek. Improving integer security for systems with kint. In Operating Systems Design and Implementation, pages 163--177, 2012."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2083669"},{"key":"e_1_3_2_1_67_1","first-page":"253","volume-title":"Foundations of Software Engineering","author":"Zeller Andreas","year":"1999","unstructured":"Andreas Zeller . Yesterday, my program worked. Today, it does not. Why ? In Foundations of Software Engineering , pages 253 -- 267 , 1999 . Andreas Zeller. Yesterday, my program worked. Today, it does not. Why? In Foundations of Software Engineering, pages 253--267, 1999."}],"event":{"name":"ASPLOS '14: Architectural Support for Programming Languages and Operating Systems","location":"Salt Lake City Utah USA","acronym":"ASPLOS '14","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 19th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2541940.2541980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2541940.2541980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:28Z","timestamp":1750219828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2541940.2541980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,24]]},"references-count":67,"alternative-id":["10.1145\/2541940.2541980","10.1145\/2541940"],"URL":"https:\/\/doi.org\/10.1145\/2541940.2541980","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2644865.2541980","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2654822.2541980","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,2,24]]},"assertion":[{"value":"2014-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}