{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:25:37Z","timestamp":1736227537263,"version":"3.32.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,22]],"date-time":"2013-07-22T00:00:00Z","timestamp":1374451200000},"content-version":"vor","delay-in-days":5316,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of King Saud University - Computer and Information Sciences"],"published-print":{"date-parts":[[1999]]},"DOI":"10.1016\/s1319-1578(99)80001-9","type":"journal-article","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T02:29:28Z","timestamp":1364351368000},"page":"1-23","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A Vector-space Model for Parallel Workload Characterization"],"prefix":"10.1007","volume":"11","author":[{"given":"Abdullah I.","family":"Al-Meajil","sequence":"first","affiliation":[]},{"given":"Tarek","family":"El-Ghazawi","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Sterlings","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10.1016\/S1319-1578(99)80001-9_bib1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.1974.6323440","article-title":"Measurements of Parallelism in Ordinary FORTRAN Programs","volume":"7","author":"Kuck","year":"1974","journal-title":"Computer"},{"issue":"12","key":"10.1016\/S1319-1578(99)80001-9_bib2","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1109\/T-C.1972.223514","article-title":"The Inhabitation of Potential Parallelism by Conditional Jumps","volume":"C-21","author":"Riseman","year":"1972","journal-title":"IEEE Transactions on Computers"},{"issue":"10","key":"10.1016\/S1319-1578(99)80001-9_bib3","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/T-C.1970.222795","article-title":"Detection and Parallel Execution of Independent Instructions","volume":"C-19","author":"Tjaden","year":"1970","journal-title":"IEEE Transactions on Computers"},{"issue":"11","key":"10.1016\/S1319-1578(99)80001-9_bib4","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/TC.1984.1676371","article-title":"Measuring the Parallelism Available for Very Long Instruction Word Architectures","volume":"33","author":"Nicolau","year":"1984","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/S1319-1578(99)80001-9_bib5","series-title":"Proceedings of the 8th Annual Symposium on Computer Architecture","first-page":"276","article-title":"Single Instruction Stream Parallelism is Greater Than Two","author":"Butler","year":"1991"},{"key":"10.1016\/S1319-1578(99)80001-9_bib6","series-title":"Proceedings of the 19th Annual International Symposium on Computer Architecture","first-page":"46","article-title":"Limits of Control Flowon Parallelism","author":"Lam","year":"1992"},{"issue":"9","key":"10.1016\/S1319-1578(99)80001-9_bib7","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/12.2259","article-title":"Measuring Parallelism in Computation-Intensive Scientific\/Engineering Applications","volume":"C-37","author":"Kumar","year":"1988","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/S1319-1578(99)80001-9_bib8","series-title":"Proceedings of the Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, California: Santa Clara","first-page":"176","article-title":"Limits of Instruction-level Parallelism","author":"Wall","year":"1991"},{"key":"10.1016\/S1319-1578(99)80001-9_bib9","series-title":"Proceedings of the 19th Annual International Symposium on Computer Architectures","first-page":"342","article-title":"Dynamic Dependence Analysis of Ordinary Programs","author":"Austin","year":"1992"},{"key":"10.1016\/S1319-1578(99)80001-9_bib10","first-page":"60","article-title":"Assessing the Benefits of Fine-Grained Parallelism in Dataflow Programs","volume":"88","author":"Arvind","year":"1988"},{"key":"10.1016\/S1319-1578(99)80001-9_bib11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/152835.152836","article-title":"Extraction of Massive Instruction Level Parallelism","author":"Uht","year":"1993","journal-title":"ACM SIGARCH News"},{"key":"10.1016\/S1319-1578(99)80001-9_bib12","series-title":"Proceedings of the 25th Annual International Symposium on Micro-architecture (MICRO-25), Portland: Oregon","first-page":"10","article-title":"On the Limits of Program Parallelism and Its Smoothability","author":"Theobald","year":"1992"},{"key":"10.1016\/S1319-1578(99)80001-9_bib13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/2.67193","article-title":"Benchmark Characterization","author":"Conte","year":"1991","journal-title":"IEEE Computer"},{"key":"10.1016\/S1319-1578(99)80001-9_bib14","series-title":"Performance Evaluation of Supercomputers","first-page":"283","article-title":"Workload Characterization for Supercomputer","author":"Caizarossa","year":"1988"},{"key":"10.1016\/S1319-1578(99)80001-9_bib15","series-title":"Parallel Systems and Computation","first-page":"221","article-title":"Performance Evaluation of Supercomputers and Their Applications","author":"Martin","year":"1988"},{"issue":"1","key":"10.1016\/S1319-1578(99)80001-9_bib16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MC.1984.1658927","article-title":"Branch Prediction Strategies and Branch Target Buller Design","volume":"17","author":"Lee","year":"1984","journal-title":"Computer"},{"key":"10.1016\/S1319-1578(99)80001-9_bib17","series-title":"Tutorial Handouts, Supercomputer 94","article-title":"The Science of Benchmarking","author":"Hnckney","year":"1994"},{"issue":"8","key":"10.1016\/S1319-1578(99)80001-9_bib18","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/5.236190","article-title":"A Parallelism-based Analytic Approach to Performance Evaluation Using Application Programs","volume":"81","author":"Bradley","year":"1993","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S1319-1578(99)80001-9_bib19","series-title":"Lecture Notes in Computer Science, No. 1184","first-page":"515","article-title":"A Quantitative Approach fur Architecture-Invariant Parallel Workload Characterization","author":"Meajil","year":"211996"},{"year":"1994","series-title":"NAS Parallel Benchmark Results 10\u201394. NAS Technical Report NAS-94-001","author":"Bailey","key":"10.1016\/S1319-1578(99)80001-9_bib20"},{"key":"10.1016\/S1319-1578(99)80001-9_bib21","series-title":"Tutorial Handouts, Supercomputer 94","article-title":"The Science of Benchmarking","author":"Bailey","year":"1994"},{"issue":"3","key":"10.1016\/S1319-1578(99)80001-9_bib22","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1177\/109434209100500306","article-title":"The NAS Parallel Benchmarks","volume":"5","author":"Bailey","year":"1991","journal-title":"Intl J. Supercomputer Applications"},{"key":"10.1016\/S1319-1578(99)80001-9_bib23","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/88.219861","article-title":"NAS Parallel Benchmark Results","author":"Bailey","year":"1993","journal-title":"IEEE Parallel & Distributed Technology"},{"issue":"3","key":"10.1016\/S1319-1578(99)80001-9_bib24","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1145\/5666.5673","article-title":"How Not to Lie with Statistics: The Correct Way to Summarize Benchmark Results","volume":"29","author":"Fleming","year":"1986","journal-title":"Communications of ACM"},{"key":"10.1016\/S1319-1578(99)80001-9_bib25","series-title":"Proceedings of the Conference on Communication Networks and Distributed Systems Modeling and Simulation, CNDS '97","first-page":"31","article-title":"Workloads and Performance Similarities in Parallel Architecture Benchmarks","author":"Meajil","year":"1997"}],"container-title":["Journal of King Saud University - Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157899800019?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157899800019?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T17:16:00Z","timestamp":1736183760000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1319157899800019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"references-count":25,"alternative-id":["S1319157899800019"],"URL":"https:\/\/doi.org\/10.1016\/s1319-1578(99)80001-9","relation":{},"ISSN":["1319-1578"],"issn-type":[{"type":"print","value":"1319-1578"}],"subject":[],"published":{"date-parts":[[1999]]}}}