Evaluating techniques for exploiting instruction slack | IEEE Conference Publication | IEEE Xplore