{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:37:52Z","timestamp":1771468672969,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1145\/3696443.3708935","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:50:26Z","timestamp":1740225026000},"page":"600-613","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Postiz: Extending Post-increment Addressing for Loop Optimization and Code Size Reduction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1736-7676","authenticated-orcid":false,"given":"Enming","family":"Fan","sequence":"first","affiliation":[{"name":"Shanghai Enflame Technology Co. Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1120-8889","authenticated-orcid":false,"given":"Xiaofeng","family":"Guan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"},{"name":"Shanghai Enflame Technology Co. Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7471-6913","authenticated-orcid":false,"given":"Fan","family":"Hu","sequence":"additional","affiliation":[{"name":"Shanghai Enflame Technology Co. Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1779-9221","authenticated-orcid":false,"given":"Heng","family":"Shi","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"},{"name":"Shanghai Enflame Technology Co. Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3536-7623","authenticated-orcid":false,"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shanghai Enflame Technology Co. Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1142-4496","authenticated-orcid":false,"given":"Jianguo","family":"Yao","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"},{"name":"Shanghai Enflame Technology Co. Ltd., Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/190347.190423"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380220202"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1152154.1152198"},{"key":"e_1_3_2_1_4_1","volume-title":"Using the chains of recurrences algebra for data dependence testing and induction variable substitution. Ph. D. Dissertation","author":"Birch Johnnie L","unstructured":"Johnnie L Birch. 2002. Using the chains of recurrences algebra for data dependence testing and induction variable substitution. Ph. D. Dissertation. Florida State University."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370306"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597809.2597811"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45306-7_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Andrew G. Howard Menglong Zhu Bo Chen Dmitry Kalenichenko Weijun Wang Tobias Weyand Marco Andreetto and Hartwig Adam. 2017. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. https:\/\/doi.org\/10.48550\/arXiv.1704.04861 arxiv:1704.04861. 10.48550\/arXiv.1704.04861","DOI":"10.48550\/arXiv.1704.04861"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69338-3_18"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Youwei Liang Kevin Stone Ali Shameli Chris Cummins Mostafa Elhoushi Jiadong Guo Benoit Steiner Xiaomeng Yang Pengtao Xie Hugh Leather and Yuandong Tian. 2023. Learning Compiler Pass Orders using Coreset and Normalized Value Prediction. https:\/\/doi.org\/10.48550\/arXiv.2301.05104 arxiv:2301.05104. 10.48550\/arXiv.2301.05104","DOI":"10.48550\/arXiv.2301.05104"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/229542.229543"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/240518.240631"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39920-9_20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661174"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO53902.2022.9741256"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578360.3580267"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Hassan Salamy and J. Ramanujam. 2007. An Effective Heuristic for Simple Offset Assignment with Variable Coalescing. In Languages and Compilers for Parallel Computing George Alm\u00e1si C\u0103lin Ca\u015fcaval and Peng Wu (Eds.). Springer Berlin Heidelberg Berlin Heidelberg. 158\u2013172. isbn:978-3-540-72521-3 https:\/\/doi.org\/10.5555\/1757112.1757131","DOI":"10.5555\/1757112.1757131"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/266021.266103"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378521"},{"key":"e_1_3_2_1_21_1","volume-title":"Symbolic Evaluation of Chains of Recurrences for Loop Optimization","author":"van Engelen Robert","unstructured":"Robert van Engelen. 2000. Symbolic Evaluation of Chains of Recurrences for Loop Optimization. Technical Report TR-000102, Computer Science Department, Florida State University."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.678180"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070941"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.774"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734206.1734208"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/384101.384148"}],"event":{"name":"CGO '25: 23rd ACM\/IEEE International Symposium on Code Generation and Optimization","location":"Las Vegas NV USA","acronym":"CGO '25","sponsor":["SIGPLAN SIGPLAN Programming Languages","SIGMICRO SIGMICRO Microarchitecture","IEEE Computer Society IEEE Computer Society"]},"container-title":["Proceedings of the 23rd ACM\/IEEE International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696443.3708935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:13Z","timestamp":1750295413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696443.3708935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":26,"alternative-id":["10.1145\/3696443.3708935","10.1145\/3696443"],"URL":"https:\/\/doi.org\/10.1145\/3696443.3708935","relation":{},"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"2025-03-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}