{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:24:01Z","timestamp":1759335841207},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[1984,1,1]],"date-time":"1984-01-01T00:00:00Z","timestamp":441763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[1984,1]]},"DOI":"10.1109\/mc.1984.1658927","type":"journal-article","created":{"date-parts":[[2007,9,4]],"date-time":"2007-09-04T20:35:32Z","timestamp":1188938132000},"page":"6-22","source":"Crossref","is-referenced-by-count":364,"title":["Branch Prediction Strategies and Branch Target Buffer Design"],"prefix":"10.1109","volume":"17","author":[{"family":"Lee","sequence":"first","affiliation":[]},{"family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/633615.810667"},{"key":"ref38","first-page":"3503","article-title":"central control unit branch trace mechanism","volume":"24","author":"boniface","year":"1981","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref33","author":"smith","year":"1983"},{"key":"ref32","first-page":"853","article-title":"reducing cache misses in a branch history table machine","volume":"23","author":"pomerene","year":"1980","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref31","first-page":"3437","article-title":"dynamic branch prediction using branch history table","volume":"22","author":"pomerene","year":"1980","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref30","first-page":"268","article-title":"branch direction prediction mechanism","volume":"23","author":"angiulli","year":"1980","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref37","author":"lee","year":"1984","journal-title":"Performance Improvement of CPU Pipelines"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231482"},{"key":"ref35","first-page":"114","article-title":"address generate interlock memory buffer","volume":"25","author":"losq","year":"1982","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref34","first-page":"350","article-title":"address generate interlock avoidance for branch instructions in a branch-history-table processor","volume":"24","author":"driscoll","year":"1981","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref10","volume":"1 3","year":"1978","journal-title":"IBM Maintenance Library 3033 Processor Complex Theory Of Operation\/Diagrams Manual"},{"key":"ref11","first-page":"1857","article-title":"branch on condition decoding with instruction queues empty","volume":"24","author":"hughes","year":"1981","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref12","first-page":"2600","article-title":"instruction scan for an early resolution of a branch instruction","volume":"23","author":"yamour","year":"1980","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1147\/rd.111.0008"},{"key":"ref14","year":"1976","journal-title":"Amdahl 470 V\/6 Machine Reference Manual"},{"key":"ref15","year":"1976","journal-title":"The ACS System Central Processor"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/800050.801824"},{"key":"ref17","volume":"10","year":"1982","journal-title":"SIGArch Computer Architecture News"},{"key":"ref18","author":"berlekamp","year":"1979"},{"key":"ref19","first-page":"443","article-title":"risc-1: a reduced instruction set vlsi computer","author":"patterson","year":"1981","journal-title":"Proc Eighth Symp Computer Architecture"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/775406.775409"},{"key":"ref4","first-page":"33","article-title":"parallel operation in the control data 6600","volume":"26","author":"thornton","year":"1964","journal-title":"AFIPS Conf Proc"},{"key":"ref27","volume":"9","year":"1981","journal-title":"SIGARCH Newsletter"},{"key":"ref3","year":"1975","journal-title":"STAR-100 Hardware Reference Manual 60256000"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359327.359336"},{"key":"ref29","author":"spirn","year":"1977","journal-title":"Program Behavior Models and Measurements"},{"key":"ref5","year":"1975","journal-title":"Control Data 7600 Hardware Reference Manual 60367200"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1972.223514"},{"key":"ref7","first-page":"2404","article-title":"storage fetch contention reduction bv using instruction branch prediction","volume":"23","author":"garcia","year":"1980","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/356887.356892"},{"key":"ref9","volume":"2","year":"1973","journal-title":"IBM Maintenance Library System\/370 Model 168 Theory of Operation\/Diagrams Manual"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/356683.356687"},{"key":"ref20","author":"widdoes","year":"1977","journal-title":"Jump Prediction"},{"key":"ref22","first-page":"3013","article-title":"branch prediction mechanism","volume":"22","author":"liles","year":"1979","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref21","author":"hailpern","year":"1979","journal-title":"S-l Architecture Manual"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1980.1675572"},{"key":"ref23","first-page":"97","article-title":"technique for minimizing branch delay due to incorrect branch history table predictions","volume":"25","author":"rao","year":"1982","journal-title":"IBM Technical Disclosure Bull"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/285930.285980"},{"key":"ref25","first-page":"99","article-title":"generalized history table for branch prediction","volume":"25","author":"losq","year":"1982","journal-title":"IBM Technical Disclosure Bull"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/2\/34735\/01658927.pdf?arnumber=1658927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:57:48Z","timestamp":1642006668000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1658927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1984,1]]},"references-count":39,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mc.1984.1658927","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[1984,1]]}}}