{"id":"https://openalex.org/W2040717438","doi":"https://doi.org/10.1145/1498690.1498693","title":"Abstracting access patterns of dynamic memory using regular expressions","display_name":"Abstracting access patterns of dynamic memory using regular expressions","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2040717438","doi":"https://doi.org/10.1145/1498690.1498693","mag":"2040717438"},"language":"en","primary_location":{"id":"doi:10.1145/1498690.1498693","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1498690.1498693","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1498690.1498693","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/1498690.1498693","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018672826","display_name":"Jinseong Jeon","orcid":null},"institutions":[{"id":"https://openalex.org/I2801036362","display_name":"Agency for Defense Development","ror":"https://ror.org/05fhe0r85","country_code":"KR","type":"government","lineage":["https://openalex.org/I1327899338","https://openalex.org/I1344042128","https://openalex.org/I2801036362","https://openalex.org/I2801339556"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jinseong Jeon","raw_affiliation_strings":["Agency for Defense Development, Korea"],"affiliations":[{"raw_affiliation_string":"Agency for Defense Development, Korea","institution_ids":["https://openalex.org/I2801036362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103575207","display_name":"Keoncheol Shin","orcid":null},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Keoncheol Shin","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology (KAIST)","Korea Advanced Institute of science and Technology (KAIST)"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology (KAIST)","institution_ids":["https://openalex.org/I157485424"]},{"raw_affiliation_string":"Korea Advanced Institute of science and Technology (KAIST)","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035561846","display_name":"Hwansoo Han","orcid":"https://orcid.org/0000-0001-7182-8452"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hwansoo Han","raw_affiliation_strings":["Sungkyunkwan University, Gyeonggi-do, Republic of Korea","[Sungkyunkwan University, Gyeonggi-do, Republic of Korea]"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Gyeonggi-do, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"[Sungkyunkwan University, Gyeonggi-do, Republic of Korea]","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018672826"],"corresponding_institution_ids":["https://openalex.org/I2801036362"],"apc_list":null,"apc_paid":null,"fwci":0.536,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66597255,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5","issue":"4","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9061059951782227},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6916576623916626},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.6541064977645874},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5906127095222473},{"id":"https://openalex.org/keywords/optimizing-compiler","display_name":"Optimizing compiler","score":0.5536999702453613},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5408855080604553},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4810062348842621},{"id":"https://openalex.org/keywords/memory-hierarchy","display_name":"Memory hierarchy","score":0.4720523953437805},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4327337443828583},{"id":"https://openalex.org/keywords/compile-time","display_name":"Compile time","score":0.42384645342826843},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3574838638305664},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1609627604484558}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9061059951782227},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6916576623916626},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.6541064977645874},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5906127095222473},{"id":"https://openalex.org/C190902152","wikidata":"https://www.wikidata.org/wiki/Q1325106","display_name":"Optimizing compiler","level":3,"score":0.5536999702453613},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5408855080604553},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4810062348842621},{"id":"https://openalex.org/C2778100165","wikidata":"https://www.wikidata.org/wiki/Q1589327","display_name":"Memory hierarchy","level":3,"score":0.4720523953437805},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4327337443828583},{"id":"https://openalex.org/C200833197","wikidata":"https://www.wikidata.org/wiki/Q333707","display_name":"Compile time","level":3,"score":0.42384645342826843},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3574838638305664},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1609627604484558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1498690.1498693","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1498690.1498693","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1498690.1498693","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/1498690.1498693","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1498690.1498693","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1498690.1498693","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5219501269","display_name":null,"funder_award_id":"IITA-2008-C1090-0801-0020","funder_id":"https://openalex.org/F4320321640","funder_display_name":"Ministry of Knowledge Economy"}],"funders":[{"id":"https://openalex.org/F4320321640","display_name":"Ministry of Knowledge Economy","ror":"https://ror.org/008nkqk13"},{"id":"https://openalex.org/F4320324161","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2040717438.pdf","grobid_xml":"https://content.openalex.org/works/W2040717438.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2852225","https://openalex.org/W1491178396","https://openalex.org/W1973326708","https://openalex.org/W1991707635","https://openalex.org/W2002089154","https://openalex.org/W2004976090","https://openalex.org/W2006638707","https://openalex.org/W2010194128","https://openalex.org/W2035974062","https://openalex.org/W2079366392","https://openalex.org/W2095115578","https://openalex.org/W2101462267","https://openalex.org/W2107089133","https://openalex.org/W2111069040","https://openalex.org/W2111367353","https://openalex.org/W2119179558","https://openalex.org/W2131574356","https://openalex.org/W2139165932","https://openalex.org/W2141170493","https://openalex.org/W2147278401","https://openalex.org/W2154554979","https://openalex.org/W2160428104","https://openalex.org/W2166034429","https://openalex.org/W2295903414","https://openalex.org/W4236944756","https://openalex.org/W4237187719","https://openalex.org/W4250784990","https://openalex.org/W4253103663"],"related_works":["https://openalex.org/W2371266106","https://openalex.org/W2117382851","https://openalex.org/W3006505070","https://openalex.org/W2382449560","https://openalex.org/W2767298477","https://openalex.org/W2110432562","https://openalex.org/W2002505081","https://openalex.org/W2083681681","https://openalex.org/W2577630842","https://openalex.org/W1172579163"],"abstract_inverted_index":{"Unless":[0],"the":[1,25,28,59,66,162,176,181,210],"speed":[2],"gap":[3],"between":[4],"CPU":[5],"and":[6,41,130,150,157,173,183,224],"memory":[7,10,29,84,98,106,216],"disappears,":[8],"efficient":[9],"usage":[11,21],"remains":[12],"a":[13,73,145,166],"decisive":[14],"factor":[15],"for":[16,97,161,214],"performance.":[17],"To":[18,143,179],"optimize":[19],"data":[20],"of":[22,27,50,58,140,185,200],"programs":[23,51,164],"in":[24,35,112,119,165],"presence":[26],"hierarchy,":[30],"we":[31,101,122,148,188],"are":[32,95,202],"particularly":[33],"interested":[34],"two":[36],"compiler":[37,76],"techniques:":[38],"pool":[39,124],"allocation":[40,125],"field":[42,132,137],"layout":[43,133,212],"restructuring":[44,134],".":[45],"Since":[46],"foreseeing":[47],"runtime":[48],"behaviors":[49],"at":[52],"compile":[53],"time":[54],"is":[55,70],"difficult,":[56],"most":[57],"previous":[60],"work":[61],"relied":[62],"on":[63,115,229],"profiling.":[64],"On":[65],"contrary,":[67],"our":[68,171,186],"goal":[69],"to":[71,82,104,126,136],"develop":[72],"fully":[74],"automatic":[75],"that":[77,87,209],"statically":[78],"transforms":[79],"input":[80],"codes":[81],"use":[83],"efficiently.":[85],"Noticing":[86],"regular":[88,110,120],"expressions":[89,111],",":[90],"which":[91,155],"denote":[92],"repetition":[93],"explicitly,":[94],"sufficient":[96],"access":[99,107,159],"patterns,":[100],"describe":[102],"how":[103],"extract":[105],"patterns":[108,117,160],"as":[109],"detail.":[113],"Based":[114],"static":[116,211],"presented":[118],"expressions,":[121],"apply":[123,151],"repeatedly":[127],"accessed":[128],"structures":[129],"exploit":[131],"according":[135],"affinity":[138],"relations":[139],"chosen":[141],"structures.":[142],"make":[144],"scalable":[146],"framework,":[147],"devise":[149],"new":[152],"abstraction":[153],"techniques,":[154],"build":[156],"interpret":[158],"whole":[163],"bottom-up":[167],"fashion.":[168],"We":[169],"implement":[170],"analyses":[172],"transformations":[174,213],"with":[175],"CIL":[177],"compiler.":[178],"verify":[180],"effect":[182],"scalability":[184],"scheme,":[187],"examine":[189],"17":[190],"benchmarks":[191,196],"including":[192],"2":[193],"SPECINT":[194],"2000":[195],"whose":[197],"source":[198],"lines":[199],"code":[201],"larger":[203],"than":[204],"10,000.":[205],"Our":[206],"experiments":[207],"demonstrate":[208],"dynamic":[215],"can":[217],"reduce":[218],"L1D":[219],"cache":[220],"misses":[221],"by":[222,227],"16%":[223],"execution":[225],"times":[226],"14%":[228],"average.":[230]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
