{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:07:15Z","timestamp":1769846835285,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2027,1,29]],"date-time":"2027-01-29T00:00:00Z","timestamp":1801180800000},"content-version":"vor","delay-in-days":480,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Triad National Security, LLC","award":["subcontracts #581326 and #C4975"],"award-info":[{"award-number":["subcontracts #581326 and #C4975"]}]},{"name":"Department of Energy (DOE) National Nuclear Security Administration (NNSA)","award":["DEAC52-06NA25396"],"award-info":[{"award-number":["DEAC52-06NA25396"]}]},{"name":"Los Alamos National Laboratory","award":["JAPB-SID1"],"award-info":[{"award-number":["JAPB-SID1"]}]},{"name":"NSF OAC","award":["#2411456"],"award-info":[{"award-number":["#2411456"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1145\/3767110.3767128","type":"proceedings-article","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:36:01Z","timestamp":1769747761000},"page":"226-237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Compile Time Prediction of Cache Reuse for Array Applications with Multiple Loop Nests"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7577-5608","authenticated-orcid":false,"given":"Abdur","family":"Razzak","sequence":"first","affiliation":[{"name":"Computer Science, New Mexico State University, Las Cruces, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6879-4455","authenticated-orcid":false,"given":"Atanu","family":"Barai","sequence":"additional","affiliation":[{"name":"CCS3, Los Alamos National Laboratory, Los Alamos, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4755-7821","authenticated-orcid":false,"given":"Nandakishore","family":"Santhi","sequence":"additional","affiliation":[{"name":"Information Sciences Group (CCS3), Los Alamos National Laboratory, Los Alamos, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8027-1449","authenticated-orcid":false,"given":"Abdel-Hameed","family":"Badawy","sequence":"additional","affiliation":[{"name":"Klipsch School of ECE, New Mexico State University, Las Cruces, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2026,1,29]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3631882.3631885"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Kristof Beyls and Erik\u00a0H. D\u2019Hollander. 2009. Refactoring for Data Locality. Computer 42 2 (2009) 62\u201371. 10.1109\/MC.2009.57","DOI":"10.1109\/MC.2009.57"},{"key":"e_1_3_3_1_4_2","unstructured":"Mark Brehob and Richard Enbody. 1999. An analytical model of locality and caching. Tech. Rep. MSU-CSE-99-31 (1999)."},{"key":"e_1_3_3_1_5_2","unstructured":"Jan Edler and Mark\u00a0D. Hill. 1999. Dinero IV: A Trace-Driven Uniprocessor Cache Simulator. https:\/\/pages.cs.wisc.edu\/\u00a0markhill\/DineroIV\/. Accessed: 2025-05-06."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid57682.2023.00021"},{"key":"e_1_3_3_1_7_2","unstructured":"Julian\u00a0Seward et al.2024. Valgrind: A Dynamic Binary Instrumentation Framework. https:\/\/valgrind.org\/. Accessed: 2025-05-06."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3437801.3441600"},{"key":"e_1_3_3_1_9_2","unstructured":"Ming Ling Jiancong Ge and Guangmin Wang. 2019. Fast Modeling L2 Cache Reuse Distance Histograms Using Combined Locality Information from Software Traces. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1907.05068 (2019). https:\/\/arxiv.org\/abs\/1907.05068"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.117"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3695794.3695817"},{"key":"e_1_3_3_1_12_2","unstructured":"Matthias\u00a0J. Reisinger. 2021. PolyBenchC-4.2.1. https:\/\/github.com\/MatthiasJReisinger\/PolyBenchC-4.2.1. Accessed: 2025-05-06."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Muhammad\u00a0Aditya Sasongko Milind Chabbi Mandana\u00a0Bagheri Marzijarani and Didem Unat. 2021. ReuseTracker: Fast Yet Accurate Multicore Reuse Distance Analyzer. ACM Trans. Archit. Code Optim. 19 1 Article 3 (dec 2021) 25\u00a0pages. 10.1145\/3484199","DOI":"10.1145\/3484199"},{"key":"e_1_3_3_1_14_2","first-page":"1","volume-title":"Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation (PLDI)","author":"Xue J.","year":"1997","unstructured":"J. Xue and Y. Huang. 1997. Reuse-driven tiling for data locality. In Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation (PLDI). ACM, 1\u201312."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Yutao Zhong Xipeng Shen and Chen Ding. 2009. Program locality analysis using reuse distance. ACM Trans. Program. Lang. Syst. 31 6 Article 20 (Aug. 2009) 39\u00a0pages. 10.1145\/1552309.1552310","DOI":"10.1145\/1552309.1552310"}],"event":{"name":"MemSys '25: International Symposium on Memory Systems","location":"Washington USA","acronym":"MemSys '25"},"container-title":["Proceedings of the International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3767110.3767128","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3767110.3767128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:36:24Z","timestamp":1769747784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3767110.3767128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":14,"alternative-id":["10.1145\/3767110.3767128","10.1145\/3767110"],"URL":"https:\/\/doi.org\/10.1145\/3767110.3767128","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]},"assertion":[{"value":"2026-01-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}