{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:52:24Z","timestamp":1756000344866,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T00:00:00Z","timestamp":1590364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,25]]},"DOI":"10.1145\/3378678.3391874","type":"proceedings-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:21:35Z","timestamp":1590452495000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Data-layout optimization based on memory-access-pattern analysis for source-code performance improvement"],"prefix":"10.1145","author":[{"given":"Riyane Sid","family":"Lakhdar","sequence":"first","affiliation":[{"name":"Univ Grenoble, France"}]},{"given":"Henri-Pierre","family":"Charles","sequence":"additional","affiliation":[{"name":"Univ Grenoble, France"}]},{"given":"Maha","family":"Kooli","sequence":"additional","affiliation":[{"name":"Univ Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2020,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mohamed Benabderrahmane et al. 2010. The polyhedral model is more widely applicable than you think. In CC.  Mohamed Benabderrahmane et al. 2010. The polyhedral model is more widely applicable than you think. In CC.","DOI":"10.1007\/978-3-642-11970-5_16"},{"key":"e_1_3_2_1_2_1","unstructured":"Doosan Cho et al. 2008. Compiler driven data layout optimization for regular\/irregular array access patterns. ACM.  Doosan Cho et al. 2008. Compiler driven data layout optimization for regular\/irregular array access patterns. ACM."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Keith D Cooper and Timothy J Harvey. 1998. Compiler-controlled memory. In SIGOPS OSR. ACM.  Keith D Cooper and Timothy J Harvey. 1998. Compiler-controlled memory. In SIGOPS OSR. ACM.","DOI":"10.1145\/291069.291010"},{"key":"e_1_3_2_1_4_1","unstructured":"Stephane Eranian. 2006. Perfmon2: a flexible performance monitoring interface for Linux. In OLS.  Stephane Eranian. 2006. Perfmon2: a flexible performance monitoring interface for Linux. In OLS."},{"key":"e_1_3_2_1_5_1","first-page":"711","article-title":"Three-dimensional memory cache system","volume":"6","author":"David Friedman","year":"2004","unstructured":"David Friedman et al. 2004 . Three-dimensional memory cache system . US Patent 6 , 711 ,043. David Friedman et al. 2004. Three-dimensional memory cache system. US Patent 6,711,043.","journal-title":"US Patent"},{"key":"e_1_3_2_1_6_1","volume-title":"FFTW: An adaptive software architecture for the FFT. In ICASSP.","author":"Frigo Matteo","year":"1998","unstructured":"Matteo Frigo and Steven G Johnson . 1998 . FFTW: An adaptive software architecture for the FFT. In ICASSP. Matteo Frigo and Steven G Johnson. 1998. FFTW: An adaptive software architecture for the FFT. In ICASSP."},{"volume-title":"GCC: the complete reference","author":"Griffith Arthur","key":"e_1_3_2_1_7_1","unstructured":"Arthur Griffith . 2002. GCC: the complete reference . McGraw-Hill . Arthur Griffith. 2002. GCC: the complete reference. McGraw-Hill."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Larry L Havlicek etal 1976. Robustness of the Pearson correlation against violations of assumptions. Perceptual and Motor Skills (1976).  Larry L Havlicek et al. 1976. Robustness of the Pearson correlation against violations of assumptions. Perceptual and Motor Skills (1976).","DOI":"10.2466\/pms.1976.43.3f.1319"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Ilya Issenin et al. 2006. Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies. In DAC.  Ilya Issenin et al. 2006. Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies. In DAC.","DOI":"10.1145\/1146909.1146925"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Mahmut Kandemir et al. 2001. Dynamic management of scratch-pad memory space. In DAC. IEEE.  Mahmut Kandemir et al. 2001. Dynamic management of scratch-pad memory space. In DAC. IEEE.","DOI":"10.1145\/378239.379049"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mahmut Kandemir et al. 2005. Memory systems and compiler support for mpsoc architectures. In MpSoC. Elsevier.  Mahmut Kandemir et al. 2005. Memory systems and compiler support for mpsoc architectures. In MpSoC. Elsevier.","DOI":"10.1016\/B978-012385251-9\/50024-4"},{"key":"e_1_3_2_1_12_1","volume-title":"The BSD conf.","author":"Lattner Chris","year":"2008","unstructured":"Chris Lattner . 2008 . LLVM and Clang: Next generation compiler technology . In The BSD conf. Chris Lattner. 2008. LLVM and Clang: Next generation compiler technology. In The BSD conf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Rahman Lavaee et al. 2019. Codestitcher: inter-procedural basic block layout. In CC. ACM.  Rahman Lavaee et al. 2019. Codestitcher: inter-procedural basic block layout. In CC. ACM.","DOI":"10.1145\/3302516.3307358"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Alain M Leger etal 1991. JPEG still picture compression algorithm. Optical Engineering (1991).  Alain M Leger et al. 1991. JPEG still picture compression algorithm. Optical Engineering (1991).","DOI":"10.1117\/12.55896"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Lian Li et al. 2005. Memory coloring: A compiler approach for scratchpad memory. In PACT.  Lian Li et al. 2005. Memory coloring: A compiler approach for scratchpad memory. In PACT.","DOI":"10.1109\/PACT.2005.27"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Samy Meftali et al. 2001. An optimal memory allocation for application-specific multiprocessor system-on-chip. In ISSS. ACM.  Samy Meftali et al. 2001. An optimal memory allocation for application-specific multiprocessor system-on-chip. In ISSS. ACM.","DOI":"10.1145\/500001.500006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Charith Mendis et al. 2019. Revec: program rejuvenation through revectorization. In CC.  Charith Mendis et al. 2019. Revec: program rejuvenation through revectorization. In CC.","DOI":"10.1145\/3302516.3307357"},{"key":"e_1_3_2_1_19_1","volume-title":"Polybench: The polyhedral benchmark suite. URL: http:\/\/www.cs.ucla.edu\/pouchet\/software\/poly-bench","author":"Pouchet Louis-No\u00ebl","year":"2012","unstructured":"Louis-No\u00ebl Pouchet . 2012 . Polybench: The polyhedral benchmark suite. URL: http:\/\/www.cs.ucla.edu\/pouchet\/software\/poly-bench (2012). Louis-No\u00ebl Pouchet. 2012. Polybench: The polyhedral benchmark suite. URL: http:\/\/www.cs.ucla.edu\/pouchet\/software\/poly-bench (2012)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Sid Lakhdar Riyane etal 2019. Toward Modeling of Cache-Miss Ratio for Dense-Data-Access-Based Optimization. In RSP. ACM.  Sid Lakhdar Riyane et al. 2019. Toward Modeling of Cache-Miss Ratio for Dense-Data-Access-Based Optimization. In RSP. ACM.","DOI":"10.1145\/3339985.3358498"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Manuel Serrano et al. 2019. Property caches revisited. In CC.  Manuel Serrano et al. 2019. Property caches revisited. In CC.","DOI":"10.1145\/3302516.3307344"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Aviral Shrivastava et al. 2016. Automatic management of software programmable memories in many-core architectures. IET CDT (2016).  Aviral Shrivastava et al. 2016. Automatic management of software programmable memories in many-core architectures. IET CDT (2016).","DOI":"10.1049\/iet-cdt.2016.0024"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Daniele Spampinato et al. 2016. A basic linear algebra compiler for structured matrices. In CGO.  Daniele Spampinato et al. 2016. A basic linear algebra compiler for structured matrices. In CGO.","DOI":"10.1145\/2854038.2854060"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Manish Verma et al. 2003. Data partitioning for maximal scratchpad usage. In ASPDAC. ACM.  Manish Verma et al. 2003. Data partitioning for maximal scratchpad usage. In ASPDAC. ACM.","DOI":"10.1145\/1119772.1119788"},{"key":"e_1_3_2_1_25_1","first-page":"229","article-title":"Instruction and logic for software hints to improve hardware prefetcher effectiveness","volume":"10","author":"Wilkerson Christopher B","year":"2019","unstructured":"Christopher B Wilkerson 2019 . Instruction and logic for software hints to improve hardware prefetcher effectiveness . US Patent 10 , 229 ,060. Christopher B Wilkerson et al. 2019. Instruction and logic for software hints to improve hardware prefetcher effectiveness. US Patent 10,229,060.","journal-title":"US Patent"},{"key":"e_1_3_2_1_26_1","unstructured":"Zhixing Xu et al. 2017. Malware detection using machine learning based analysis of virtual memory access patterns. In DATE.  Zhixing Xu et al. 2017. Malware detection using machine learning based analysis of virtual memory access patterns. In DATE."},{"key":"e_1_3_2_1_27_1","unstructured":"Qingxiong Yang. 2012. Recursive bilateral filtering. In ECCV.  Qingxiong Yang. 2012. Recursive bilateral filtering. In ECCV."}],"event":{"name":"SCOPES '20: 23rd International Workshop on Software and Compilers for Embedded Systems","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","EDAA European Design Automation Association"],"location":"St. Goar Germany","acronym":"SCOPES '20"},"container-title":["Proceedings of the 23th International Workshop on Software and Compilers for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378678.3391874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378678.3391874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:19Z","timestamp":1750200079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378678.3391874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,25]]},"references-count":26,"alternative-id":["10.1145\/3378678.3391874","10.1145\/3378678"],"URL":"https:\/\/doi.org\/10.1145\/3378678.3391874","relation":{},"subject":[],"published":{"date-parts":[[2020,5,25]]},"assertion":[{"value":"2020-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}