{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:36:24Z","timestamp":1730316984098,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,12]]},"DOI":"10.1145\/2597809.2597811","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"85-94","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Exploiting function similarity for code size reduction"],"prefix":"10.1145","author":[{"given":"Tobias J.K.","family":"Edler von Koch","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Bj\u00f6rn","family":"Franke","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Pranav","family":"Bhandarkar","sequence":"additional","affiliation":[{"name":"Qualcomm Innovation Center Inc., Austin, TX, USA"}]},{"given":"Anshuman","family":"Dasgupta","sequence":"additional","affiliation":[{"name":"Qualcomm Innovation Center Inc., Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ArmtextscCortex M-4 specification 2013. URL http:\/\/www.arm.com\/products\/processors\/cortex-m\/cortex-m4-processor.php. ArmtextscCortex M-4 specification 2013. URL http:\/\/www.arm.com\/products\/processors\/cortex-m\/cortex-m4-processor.php."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937504"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065910.1065926"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-006-8538-6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"W.-K.\n Chen B.\n Li and \n R.\n Gupta\n . \n Code compaction of matching single-entry multiple-exit regions\n . In R. Cousot editor phStatic Analysis volume \n 2694\n of \n Lecture Notes in Computer Science pages \n 401\n --\n 417\n . \n Springer Berlin Heidelberg 2003\n . W.-K. Chen B. Li and R. Gupta. Code compaction of matching single-entry multiple-exit regions. In R. Cousot editor phStatic Analysis volume 2694 of Lecture Notes in Computer Science pages 401--417. Springer Berlin Heidelberg 2003.","DOI":"10.1007\/3-540-44898-5_23"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2013.7478317"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301655"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053271.1053274"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859696"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/384198.384204"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582445"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086642.1086645"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512542"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/349214.349233"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/776261.776296"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Symposium sur la Securite des Technologies de l'Information et des Communications","author":"Dullien T.","year":"2005","unstructured":"T. Dullien and R. Rolles . Graph-based comparison of executable objects . In Proceedings of the Symposium sur la Securite des Technologies de l'Information et des Communications , 2005 . T. Dullien and R. Rolles. Graph-based comparison of executable objects. In Proceedings of the Symposium sur la Securite des Technologies de l'Information et des Communications, 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"phThinking in C++","author":"Eckel B.","year":"2003","unstructured":"B. Eckel . phThinking in C++ , Vol. 2 , chapter 5. Pearson Education, 2003 . ISBN 0130353132. B. Eckel. phThinking in C++, Vol. 2, chapter 5. Pearson Education, 2003. ISBN 0130353132."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772980"},{"key":"e_1_3_2_1_20_1","series-title":"LNI","first-page":"161","volume-title":"DIMVA","author":"Flake H.","year":"2004","unstructured":"H. Flake . Structural comparison of executable objects. In U. Flegel and M. Meier, editors, DIMVA , volume 46 of LNI , pages 161 -- 173 . GI , 2004 . H. Flake. Structural comparison of executable objects. In U. Flegel and M. Meier, editors, DIMVA, volume 46 of LNI, pages 161--173. GI, 2004."},{"key":"e_1_3_2_1_21_1","first-page":"402","volume-title":"DATE","author":"Halambi A.","year":"2002","unstructured":"A. Halambi , A. Shrivastava , P. Biswas , N. D. Dutt , and A. Nicolau . An efficient compiler technique for code size reduction using reduced bit-width ISAs . In DATE , pages 402 -- 408 . IEEE Computer Society , 2002 . A. Halambi, A. Shrivastava, P. Biswas, N. D. Dutt, and A. Nicolau. An efficient compiler technique for code size reduction using reduced bit-width ISAs. In DATE, pages 402--408. IEEE Computer Society, 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11796435_20"},{"key":"e_1_3_2_1_23_1","unstructured":"R. Jenkins. GCC Bug 29442: insn-attrtab has grown too large. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=29442 October 2006. R. Jenkins. GCC Bug 29442: insn-attrtab has grown too large. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=29442 October 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/647170.718283"},{"key":"e_1_3_2_1_26_1","first-page":"137","article-title":"On similarity of functions","volume":"36","author":"Kupka I.","year":"2010","unstructured":"I. Kupka . On similarity of functions . Topology Proceedings , 36 : 137 -- 187 , 2010 . I. Kupka. On similarity of functions. Topology Proceedings, 36: 137--187, 2010.","journal-title":"Topology Proceedings"},{"key":"e_1_3_2_1_27_1","first-page":"79","volume-title":"Proceedings of the 2004 GCC Developers' Summit","author":"L\u00f3ki G.","year":"2004","unstructured":"G. L\u00f3ki , A. Kiss , J. J\u00e1sz , and A. Besz\u00e9des . Code factoring in GCC . In Proceedings of the 2004 GCC Developers' Summit , pages 79 -- 84 , June 2004 . G. L\u00f3ki, A. Kiss, J. J\u00e1sz, and A. Besz\u00e9des. Code factoring in GCC. In Proceedings of the 2004 GCC Developers' Summit, pages 79--84, June 2004."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"International Electron Devices Meeting, IEDM'06","author":"Park Y.","year":"2006","unstructured":"Y. Park , J. Choi , C. Kang , C. Lee , Y. Shin , B. Choi , J. Kim , S. Jeon , J. Sel , J. Park , K. Choi , T. Yoo , J. Sim , and K. Kim . Highly manufacturable 32Gb multi-level NAND Flash memory with 0.0098\u03bc m2 cell size using TANOS (Si-Oxide-Al2O3-TaN) cell technology . In International Electron Devices Meeting, IEDM'06 , pages 1 -- 4 , 2006 . Y. Park, J. Choi, C. Kang, C. Lee, Y. Shin, B. Choi, J. Kim, S. Jeon, J. Sel, J. Park, K. Choi, T. Yoo, J. Sim, and K. Kim. Highly manufacturable 32Gb multi-level NAND Flash memory with 0.0098\u03bc m2 cell size using TANOS (Si-Oxide-Al2O3-TaN) cell technology. In International Electron Devices Meeting, IEDM'06, pages 1--4, 2006."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_30_1","volume-title":"GNU Compiler Collection Internals","author":"R.","year":"2013","unstructured":"eveloper Community(2013)}gcc R. M. Stallman and the GCC Developer Community . GNU Compiler Collection Internals , 2013 . eveloper Community(2013)}gccR. M. Stallman and the GCC Developer Community. GNU Compiler Collection Internals, 2013."},{"key":"e_1_3_2_1_31_1","volume-title":"GCC Developers Summit","author":"Tallam S.","year":"2010","unstructured":"S. Tallam , C. Coutant , I. L. Taylor , X. D. Li , and C. Demetriou . Safe ICF: Pointer safe and unwinding aware identical code folding in gold . In GCC Developers Summit , 2010 . S. Tallam, C. Coutant, I. L. Taylor, X. D. Li, and C. Demetriou. Safe ICF: Pointer safe and unwinding aware identical code folding in gold. In GCC Developers Summit, 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062261.1062278"},{"key":"e_1_3_2_1_33_1","first-page":"7","volume-title":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology","author":"Put L. Van","year":"2005","unstructured":"L. Van Put , D. Chanet , B. De Bus , B. De Sutter , and K. De Bosschere . DIABLO: a reliable, retargetable and extensible link-time rewriting framework . In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology , pages 7 -- 12 , 2005 . L. Van Put, D. Chanet, B. De Bus, B. De Sutter, and K. De Bosschere. DIABLO: a reliable, retargetable and extensible link-time rewriting framework. In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, pages 7--12, 2005."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302736"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAHPC.2005.26"}],"event":{"name":"LCTES '14: SIGPLAN\/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems 2014","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Edinburgh United Kingdom","acronym":"LCTES '14"},"container-title":["Proceedings of the 2014 SIGPLAN\/SIGBED conference on Languages, compilers and tools for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2597809.2597811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T17:25:23Z","timestamp":1693848323000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597809.2597811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,12]]},"references-count":34,"alternative-id":["10.1145\/2597809.2597811","10.1145\/2597809"],"URL":"https:\/\/doi.org\/10.1145\/2597809.2597811","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2666357.2597811","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,6,12]]},"assertion":[{"value":"2014-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}