Exploiting dead value information | IEEE Conference Publication | IEEE Xplore