{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:56:22Z","timestamp":1778604982679,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T00:00:00Z","timestamp":1550275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1619140, CCF-1617954"],"award-info":[{"award-number":["CCF-1619140, CCF-1617954"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,16]]},"DOI":"10.1145\/3302516.3307351","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:37:34Z","timestamp":1550173054000},"page":"147-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Valence: variable length calling context encoding"],"prefix":"10.1145","author":[{"given":"Tong","family":"Zhou","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, USA"}]},{"given":"Michael R.","family":"Jantz","sequence":"additional","affiliation":[{"name":"University of Tennessee, USA"}]},{"given":"Prasad A.","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"University of Kansas, USA"}]},{"given":"Kshitij A.","family":"Doshi","sequence":"additional","affiliation":[{"name":"Intel, USA"}]},{"given":"Vivek","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Flang. https:\/\/github.com\/flang-compiler\/flang. 2018. Flang. https:\/\/github.com\/flang-compiler\/flang."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1002\/cpe.1553","article-title":"HPCTOOLKIT: Tools for Performance Analysis of Optimized Parallel Programs Http:\/\/Hpctoolkit.Org","volume":"22","author":"Adhianto L.","year":"2010","unstructured":"L. Adhianto , S. Banerjee , M. Fagan , M. Krentel , G. Marin , J. Mellor-Crummey , and N. R. Tallent . 2010 . HPCTOOLKIT: Tools for Performance Analysis of Optimized Parallel Programs Http:\/\/Hpctoolkit.Org . Concurr. Comput. : Pract. Exper. 22 , 6 (April 2010), 685\u2013701. L. Adhianto, S. Banerjee, M. Fagan, M. Krentel, G. Marin, J. Mellor-Crummey, and N. R. Tallent. 2010. HPCTOOLKIT: Tools for Performance Analysis of Optimized Parallel Programs Http:\/\/Hpctoolkit.Org. Concurr. Comput. : Pract. Exper. 22, 6 (April 2010), 685\u2013701.","journal-title":"Concurr. Comput. : Pract. Exper."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258924"},{"key":"e_1_3_2_1_4_1","volume-title":"Stack Trace Analysis for Large Scale Debugging. In 2007 IEEE International Parallel and Distributed Processing Symposium. 1\u201310","author":"Arnold D. C.","year":"2007","unstructured":"D. C. Arnold , D. H. Ahn , B. R. de Supinski , G. L. Lee , B. P. Miller , and M. Schulz . 2007 . Stack Trace Analysis for Large Scale Debugging. In 2007 IEEE International Parallel and Distributed Processing Symposium. 1\u201310 . IPDPS. 2007 .370254 D. C. Arnold, D. H. Ahn, B. R. de Supinski, G. L. Lee, B. P. Miller, and M. Schulz. 2007. Stack Trace Analysis for Large Scale Debugging. In 2007 IEEE International Parallel and Distributed Processing Symposium. 1\u201310. IPDPS.2007.370254"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 29)","author":"Ball Thomas","unstructured":"Thomas Ball and James R. Larus . 1996. Efficient Path Profiling . In Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 29) . IEEE Computer Society, Washington, DC, USA, 46\u201357. http:\/\/dl.acm.org\/ citation.cfm?id=243846.243857 Thomas Ball and James R. Larus. 1996. Efficient Path Profiling. In Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 29). IEEE Computer Society, Washington, DC, USA, 46\u201357. http:\/\/dl.acm.org\/ citation.cfm?id=243846.243857"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.624306"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806599"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297035"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297057"},{"key":"e_1_3_2_1_10_1","unstructured":"Milind Chabbi Wim Lavrijsen Wibe de Jong Koushik Sen John Mellor-Crummey and Costin Iancu. 2015. Milind Chabbi Wim Lavrijsen Wibe de Jong Koushik Sen John Mellor-Crummey and Costin Iancu. 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688500.2688502"},{"key":"e_1_3_2_1_12_1","unstructured":"Milind Chabbi Shasha Wen and Xu Liu. 2018. Milind Chabbi Shasha Wen and Xu Liu. 2018."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178487.3178499"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168919.1168885"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806874"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2348"},{"key":"e_1_3_2_1_17_1","volume-title":"LNCS International Conference on Architecture of Computing Systems (ARCS \u201918)","author":"Effler T. Chad","unstructured":"T. Chad Effler , Adam P. Howard , Tong Zhou , Michael R. Jantz , Kshitij A. Doshi , and Prasad A. Kulkarni . 2018. On Automated Feedback-Driven Data Placement in Hybrid Memories .. In LNCS International Conference on Architecture of Computing Systems (ARCS \u201918) . T. Chad Effler, Adam P. Howard, Tong Zhou, Michael R. Jantz, Kshitij A. Doshi, and Prasad A. Kulkarni. 2018. On Automated Feedback-Driven Data Placement in Hybrid Memories.. In LNCS International Conference on Architecture of Computing Systems (ARCS \u201918)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830554"},{"key":"e_1_3_2_1_19_1","unstructured":"Eclipse Foundation. 2018. \"Eclipse IDE for Java Developers\". https:\/\/www.eclipse. org\/downloads\/packages\/release\/photon\/r\/eclipseidejavadevelopers Eclipse Foundation. 2018. \"Eclipse IDE for Java Developers\". https:\/\/www.eclipse. org\/downloads\/packages\/release\/photon\/r\/eclipseidejavadevelopers"},{"key":"e_1_3_2_1_20_1","unstructured":"Free Software Foundation. 2018. Free Software Foundation. 2018."},{"key":"e_1_3_2_1_21_1","unstructured":"\"GDB: The GNU Project Debugger\". https: \/\/www.gnu.org\/software\/gdb\/ \"GDB: The GNU Project Debugger\". https: \/\/www.gnu.org\/software\/gdb\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297033"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_24_1","volume-title":"2015 USENIX Annual Technical Conference (USENIX ATC 15)","author":"Guo Rentong","year":"2015","unstructured":"Rentong Guo , Xiaofei Liao , Hai Jin , Jianhui Yue , and Guang Tan . 2015 . Night-Watch: integrating lightweight and transparent cache pollution control into dynamic memory allocation systems . In 2015 USENIX Annual Technical Conference (USENIX ATC 15) . 307\u2013318. Rentong Guo, Xiaofei Liao, Hai Jin, Jianhui Yue, and Guang Tan. 2015. Night-Watch: integrating lightweight and transparent cache pollution control into dynamic memory allocation systems. In 2015 USENIX Annual Technical Conference (USENIX ATC 15). 307\u2013318."},{"key":"e_1_3_2_1_25_1","unstructured":"Qualcomm Innovation Center Ivan Baev. 2015. Profile-Based Indirect Call Promotion. https:\/\/llvm.org\/devmtg\/2015-10\/slides\/Baev-IndirectCallPromotion.pdf. Qualcomm Innovation Center Ivan Baev. 2015. Profile-Based Indirect Call Promotion. https:\/\/llvm.org\/devmtg\/2015-10\/slides\/Baev-IndirectCallPromotion.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814322"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568311"},{"key":"e_1_3_2_1_28_1","unstructured":"Andi Kleen. 2016. Andi Kleen. 2016."},{"key":"e_1_3_2_1_29_1","unstructured":"Advanced usage of last branch records. https:\/\/lwn.net\/ Articles\/680996\/ Advanced usage of last branch records. https:\/\/lwn.net\/ Articles\/680996\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Chris Lattner and Vikram Adve. 2004. Chris Lattner and Vikram Adve. 2004."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO \u201904)","author":"LLVM","unstructured":"LLVM : A Compilation Framework for Lifelong Program Analysis &amp; Transformation . In Proceedings of the International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO \u201904) . IEEE Computer Society, Washington, DC, USA, 75\u2013. http:\/\/dl.acm.org\/citation.cfm?id=977395.977673 LLVM: A Compilation Framework for Lifelong Program Analysis &amp; Transformation. In Proceedings of the International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO \u201904). IEEE Computer Society, Washington, DC, USA, 75\u2013. http:\/\/dl.acm.org\/citation.cfm?id=977395.977673"},{"key":"e_1_3_2_1_32_1","unstructured":"Jianjun Li Zhenjiang Wang Chenggang Wu Wei-Chung Hsu and Di Xu. 2014. Jianjun Li Zhenjiang Wang Chenggang Wu Wei-Chung Hsu and Di Xu. 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544167"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2190025.2190064"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807648"},{"key":"e_1_3_2_1_36_1","unstructured":"Linux Programmer\u2019s Manual. 2017. Linux Programmer\u2019s Manual. 2017."},{"key":"e_1_3_2_1_37_1","unstructured":"backtrace backtrace_symbols backtrace_symbols_fd - support for application self-debugging. http:\/\/man7.org\/ linux\/manpages\/man3\/backtrace.3.html backtrace backtrace_symbols backtrace_symbols_fd - support for application self-debugging. http:\/\/man7.org\/ linux\/manpages\/man3\/backtrace.3.html"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_39_1","unstructured":"Matthew Benjamin Olson Tong Zhou Michael R. Jantz Kshitij A. Doshi M. Graham Lopez and Oscar Hernandez. 2018. Matthew Benjamin Olson Tong Zhou Michael R. Jantz Kshitij A. Doshi M. Graham Lopez and Oscar Hernandez. 2018."},{"key":"e_1_3_2_1_40_1","volume-title":"IEEE International Conference on Networking, Architecture, and Storage (NAS \u201918)","unstructured":"MemBrain : Automated Application Guidance for Hybrid Memory Systems .. In IEEE International Conference on Networking, Architecture, and Storage (NAS \u201918) . MemBrain: Automated Application Guidance for Hybrid Memory Systems.. In IEEE International Conference on Networking, Architecture, and Storage (NAS \u201918)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31984-9_22"},{"key":"e_1_3_2_1_42_1","unstructured":"H. Servat A. J. Pe\u00f1a G. Llort E. Mercadal H. Hoppe and J. Labarta. 2017. H. Servat A. J. Pe\u00f1a G. Llort E. Mercadal H. Hoppe and J. Labarta. 2017."},{"key":"e_1_3_2_1_43_1","volume-title":"Application Data Placement in Hybrid Memory Systems. In 2017 IEEE International Conference on Cluster Computing (CLUSTER).","author":"Automating","unstructured":"Automating the Application Data Placement in Hybrid Memory Systems. In 2017 IEEE International Conference on Cluster Computing (CLUSTER). Automating the Application Data Placement in Hybrid Memory Systems. In 2017 IEEE International Conference on Cluster Computing (CLUSTER)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"e_1_3_2_1_45_1","volume-title":"SPEC CP U","author":"SPEC.","year":"2017","unstructured":"SPEC. 2017 . SPEC CP U 2017. SPEC. 2017. SPEC CP U 2017."},{"key":"e_1_3_2_1_46_1","unstructured":"https:\/\/www.spec.org\/cpu2017\/ https:\/\/www.spec.org\/cpu2017\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806875"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2010.47"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SWAT.1971.10"},{"key":"e_1_3_2_1_50_1","unstructured":"Dave Watson Arun Sharma and David Mosberger-Tang. 2017. The libunwind project. https:\/\/www.nongnu.org\/libunwind\/index.html Dave Watson Arun Sharma and David Mosberger-Tang. 2017. The libunwind project. https:\/\/www.nongnu.org\/libunwind\/index.html"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037729"},{"key":"e_1_3_2_1_52_1","unstructured":"Shasha Wen Xu Liu John Byrne and Milind Chabbi. 2018. Shasha Wen Xu Liu John Byrne and Milind Chabbi. 2018."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177159"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544150"}],"event":{"name":"CC '19: 28th International Conference on Compiler Construction","location":"Washington DC USA","acronym":"CC '19"},"container-title":["Proceedings of the 28th International Conference on Compiler Construction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302516.3307351","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302516.3307351","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302516.3307351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:55Z","timestamp":1750204435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302516.3307351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,16]]},"references-count":54,"alternative-id":["10.1145\/3302516.3307351","10.1145\/3302516"],"URL":"https:\/\/doi.org\/10.1145\/3302516.3307351","relation":{},"subject":[],"published":{"date-parts":[[2019,2,16]]},"assertion":[{"value":"2019-02-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}