{"id":"https://openalex.org/W2022668546","doi":"https://doi.org/10.1145/1132462.1132465","title":"Efficient remote profiling for resource-constrained devices","display_name":"Efficient remote profiling for resource-constrained devices","publication_year":2006,"publication_date":"2006-03-01","ids":{"openalex":"https://openalex.org/W2022668546","doi":"https://doi.org/10.1145/1132462.1132465","mag":"2022668546"},"language":"en","primary_location":{"id":"doi:10.1145/1132462.1132465","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1132462.1132465","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1132462.1132465","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/1132462.1132465","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041993933","display_name":"Priya Nagpurkar","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Priya Nagpurkar","raw_affiliation_strings":["University of California, Santa Barbara, CA","University of California, Santa Barbara, Ca#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, CA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"University of California, Santa Barbara, Ca#TAB#","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035438352","display_name":"Hussam Mousa","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hussam Mousa","raw_affiliation_strings":["University of California, Santa Barbara, CA","University of California, Santa Barbara, Ca#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, CA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"University of California, Santa Barbara, Ca#TAB#","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040516516","display_name":"Chandra Krintz","orcid":"https://orcid.org/0000-0003-4972-0669"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chandra Krintz","raw_affiliation_strings":["University of California, Santa Barbara, CA","University of California, Santa Barbara, Ca#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, CA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"University of California, Santa Barbara, Ca#TAB#","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036932071","display_name":"Timothy Sherwood","orcid":"https://orcid.org/0000-0002-6550-6075"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timothy Sherwood","raw_affiliation_strings":["University of California, Santa Barbara, CA","University of California, Santa Barbara, Ca#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, CA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"University of California, Santa Barbara, Ca#TAB#","institution_ids":["https://openalex.org/I154570441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041993933"],"corresponding_institution_ids":["https://openalex.org/I154570441"],"apc_list":null,"apc_paid":null,"fwci":0.9461,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.77949985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"1","first_page":"35","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8753839135169983},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.8515071868896484},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.7505297064781189},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.665292501449585},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6326756477355957},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5559308528900146},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5435410141944885},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.445538729429245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3667159676551819},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3582877218723297},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3415185809135437},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1123441755771637}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8753839135169983},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.8515071868896484},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.7505297064781189},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.665292501449585},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6326756477355957},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5559308528900146},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5435410141944885},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.445538729429245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3667159676551819},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3582877218723297},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3415185809135437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1123441755771637}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1132462.1132465","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1132462.1132465","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1132462.1132465","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.64.2754","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.2754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucsb.edu/~ckrintz/papers/remprofTACO.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.84.9342","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucsb.edu/~husmousa/remprof.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/1132462.1132465","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1132462.1132465","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1132462.1132465","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2250292075","display_name":"Automatic Linux Customization and Optimization for High-Performance Scientific Applications","funder_award_id":"0444412","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3025169254","display_name":"ITR: Virtual Power for a Wireless Campus - A Vision of Ubiquitous Computing On Low-Cost Mobile Devices","funder_award_id":"0205712","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8059835418","display_name":"RR:  Wireless Sensor Network Laboratory Infrastructure","funder_award_id":"0423336","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2022668546.pdf","grobid_xml":"https://content.openalex.org/works/W2022668546.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W178302743","https://openalex.org/W1479768891","https://openalex.org/W1982322251","https://openalex.org/W1990670545","https://openalex.org/W2007920703","https://openalex.org/W2008311123","https://openalex.org/W2025567609","https://openalex.org/W2032094184","https://openalex.org/W2065773673","https://openalex.org/W2070822182","https://openalex.org/W2077324087","https://openalex.org/W2089320150","https://openalex.org/W2093334386","https://openalex.org/W2096835686","https://openalex.org/W2098111217","https://openalex.org/W2101587002","https://openalex.org/W2102674270","https://openalex.org/W2103091452","https://openalex.org/W2105090082","https://openalex.org/W2107493680","https://openalex.org/W2107667898","https://openalex.org/W2110399624","https://openalex.org/W2113287010","https://openalex.org/W2115375597","https://openalex.org/W2117285153","https://openalex.org/W2128195938","https://openalex.org/W2136794719","https://openalex.org/W2140384194","https://openalex.org/W2142829732","https://openalex.org/W2145292313","https://openalex.org/W2153131460","https://openalex.org/W2153456949","https://openalex.org/W2155119470","https://openalex.org/W2155479707","https://openalex.org/W2155993470","https://openalex.org/W2163567002","https://openalex.org/W2164038693","https://openalex.org/W2170825191","https://openalex.org/W2171530146","https://openalex.org/W2998550884","https://openalex.org/W3006356086","https://openalex.org/W4246430693","https://openalex.org/W4285719527","https://openalex.org/W4298883496","https://openalex.org/W4300420355"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2059759476","https://openalex.org/W1618604010"],"abstract_inverted_index":{"The":[0,74],"widespread":[1],"use":[2,52,119],"of":[3,44,64,67,76,103,114,120,130,170,243,252,270,286],"ubiquitous,":[4],"mobile,":[5],"and":[6,22,60,69,144,241,246,255,264],"continuously":[7],"connected":[8],"computing":[9],"agents":[10],"has":[11],"inspired":[12],"software":[13,33,122],"developers":[14,50],"to":[15,47,55,83,160,172,180,195,204,214,262],"change":[16],"the":[17,32,42,62,99,104,108,111,118,167,239,248,284],"way":[18],"they":[19],"test,":[20],"debug,":[21],"optimize":[23],"software.":[24],"Users":[25],"now":[26],"play":[27],"an":[28,153],"active":[29],"role":[30],"in":[31,178,250],"evolution":[34],"cycle":[35],"by":[36],"dynamically":[37],"providing":[38],"valuable":[39],"feedback":[40,78],"about":[41],"execution":[43,177],"a":[45,65,80,93,157,225,232,268],"program":[46,138,155,205],"developers.":[48],"Software":[49],"can":[51],"this":[53],"information":[54,183],"isolate":[56],"bugs":[57],"in,":[58],"maintain,":[59],"improve":[61],"performance":[63,273],"wide-range":[66],"diverse":[68],"complex":[70],"embedded":[71,115,131],"device":[72,235],"applications.":[73],"collection":[75],"such":[77],"poses":[79],"major":[81],"challenge":[82],"systems":[84],"researchers":[85],"since":[86],"it":[87],"must":[88],"be":[89],"performed":[90],"without":[91],"degrading":[92],"user's":[94],"experience":[95],"with,":[96],"or":[97],"consuming":[98],"severely":[100],"restricted":[101],"resources":[102],"mobile":[105],"device.":[106],"At":[107],"same":[109],"time,":[110],"resource":[112],"constraints":[113],"devices":[116],"prohibit":[117],"extant":[121],"profiling":[123,129,150],"solutions.":[124],"To":[125],"achieve":[126],"efficient":[127,136],"remote":[128],"devices,":[132],"we":[133],"couple":[134],"two":[135],"hardware/software":[137],"monitoring":[139],"techniques:":[140],"Hybrid":[141],"Profiling":[142],"Support(HPS)":[143],"Phase-Aware":[145],"Sampling.":[146],"HPS":[147],"efficiently":[148],"inserts":[149],"instructions":[151],"into":[152],"executing":[154],"using":[156],"novel":[158],"extension":[159],"Dynamic-Instruction":[161],"Stream":[162],"Editing(DISE).":[163],"Phase-aware":[164],"sampling":[165,191,202,266,287],"exploits":[166],"recurring":[168],"behavior":[169,207],"programs":[171],"identify":[173],"key":[174],"opportunities":[175],"during":[176],"order":[179],"collect":[181,215],"profile":[182,274],"(i.e.":[184],"sample).":[185],"Our":[186,276],"prior":[187],"work":[188],"on":[189],"phase-aware":[190],"required":[192],"code":[193],"duplication":[194],"toggle":[196],"sampling.":[197],"By":[198],"guiding":[199],"low-overhead,":[200],"hardware-supported":[201],"according":[203],"phase":[206],"via":[208],"HPS,":[209],"our":[210,222,244,260,280],"system":[211,223,261,281],"is":[212],"able":[213],"highly":[216],"accurate":[217],"profiles":[218],"transparently.":[219],"We":[220,237,258],"evaluate":[221],"assuming":[224],"general":[226],"purpose":[227],"configuration":[228],"as":[229,231],"well":[230],"popular":[233],"handheld":[234],"configuration.":[236],"measure":[238],"accuracy":[240],"overhead":[242,249,285],"techniques":[245],"quantify":[247],"terms":[251],"computation,":[253],"communication,":[254],"power":[256],"consumption.":[257],"compare":[259],"random":[263],"periodic":[265],"for":[267],"number":[269],"widely":[271],"used":[272],"types.":[275],"results":[277],"indicate":[278],"that":[279],"significantly":[282],"reduces":[283],"while":[288],"maintaining":[289],"high":[290],"accuracy.":[291]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
