{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:52:32Z","timestamp":1725472352786},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540472421"},{"type":"electronic","value":"9783540472438"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_28","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T13:35:29Z","timestamp":1161869729000},"page":"248-257","source":"Crossref","is-referenced-by-count":0,"title":["Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache Processors"],"prefix":"10.1007","author":[{"given":"Yunhe","family":"Shi","sequence":"first","affiliation":[]},{"given":"Emre","family":"\u00d6zer","sequence":"additional","affiliation":[]},{"given":"David","family":"Gregg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Patel, S.J.: Trace Cache Design for Wide-Issue Superscalar Processor. PhD thesis, Computer Science and Engineering in The University of Michigan (1999)"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Jacobson, Q., Rotenberg, E., Smith, J.: Path-based next trace prediction. In: Proceedings of the 30th Annual ACM\/IEEE International Symposium on Microarchitecture (1997)","DOI":"10.1109\/MICRO.1997.645793"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Rotenberg, E., Bennett, S., Smith, J.E.: A trace cache microarchitecture and evaluation. IEEE Transactions on Computers (1999)","DOI":"10.1109\/12.752652"},{"key":"28_CR4","unstructured":"Santana, O.J., Falcon, A., Ramirez, A., Larriba-Pey, J.L., Valero, M.: Next stream prediction. Technical Report UPC-DAC-2002-15, Technical Report (2002)"},{"key":"28_CR5","unstructured":"Webb, C.F.: Subroutine call\/return stack. IBM Tech. Disc. Bulletin 30(11) (1988)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Kaeli, D.R., Emma, P.G.: Branch history table prediction of moving target branches due to subroutine returns. In: Proceedings of the 18th Annual International Symposium on Computer Architecture (ISCA-18) (1991)","DOI":"10.1145\/115952.115957"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Skadron, K., Ahuja, P.S., Martonosi, M., Clark, D.W.: Improving prediction for procedure returns with return-address-stack repair mechanisms. In: Proceedings of the 31st Annual ACM\/IEEE International Symposium on Microarchitecture (1998)","DOI":"10.1109\/MICRO.1998.742787"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Jourdan, S., Stark, J., Hsing, T.H., Patt, Y.N.: Recovery requirements of branch prediction storage structures in the presence of mispredicted-path execution. International Journal of Parallel Programming\u00a025(5) (1997)","DOI":"10.1007\/BF02699883"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Hily, S., Seznec, A.: Branch prediction and simultaneous multithreading. In: Proceedings of the 1996 Conference on Parallel Architectures and Compilation Techniques (PACT 1996) (1996)","DOI":"10.1109\/PACT.1996.552664"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Zahran, M.M., Franklin, M.: Return-address prediction in speculative multithreaded environments. In: Proceedings of the 9th International Conference on High Performance Computing (2002)","DOI":"10.1007\/3-540-36265-7_57"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"KleinOsowski, A.J., Lilja, D.J.: Minnespec: A new spec benchmark workload for simulation-based computer architecture research. Computer Architecture Letters\u00a01 (2002)","DOI":"10.1109\/L-CA.2002.8"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Austin, T., Larson, E., Ernst, D.: Simplescalar: An infrastructure for computer system modeling. Computer, pp. 59\u201367 (2002)","DOI":"10.1109\/2.982917"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:56:28Z","timestamp":1605642988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11902140_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}