{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:44:39Z","timestamp":1772163879138,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T00:00:00Z","timestamp":1097107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,7]]},"DOI":"10.1145\/1024393.1024417","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"199-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Software prefetching for mark-sweep garbage collection"],"prefix":"10.1145","author":[{"given":"Chen-Yong","family":"Cher","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Antony L.","family":"Hosking","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"T. N.","family":"Vijaykumar","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2004,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/106973.106984"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.982917"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/173262.155109"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/362426.362438"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/113445.113459"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380180902"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/645988.674177"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/359642.359655"},{"key":"e_1_3_2_1_10_1","volume-title":"The Java Language Specification","author":"Gosling J.","year":"2000","unstructured":"Gosling , J. , Joy , B. , Steele , Jr., G. , and Bracha , G . The Java Language Specification , second ed. Addison-Wesley , 2000 .]] Gosling, J., Joy, B., Steele, Jr., G., and Bracha, G.The Java Language Specification, second ed. Addison-Wesley, 2000.]]"},{"key":"e_1_3_2_1_11_1","unstructured":"Horowitz M. Martonosi M. Mowry T. C. and Smith M. D. Informing memory operations: Memory performance feedback mechanisms and their applications.]]  Horowitz M. Martonosi M. Mowry T. C. and Smith M. D. Informing memory operations: Memory performance feedback mechanisms and their applications.]]"},{"key":"e_1_3_2_1_12_1","first-page":"11","article-title":"A semi-incremental garbage collection algorithm","volume":"21","author":"Hughes R. J. M","year":"1982","unstructured":"Hughes , R. J. M . A semi-incremental garbage collection algorithm . Software---Practice and Experience 21 , 11 ( Nov. 1982 ), 1081--1084.]] Hughes, R. J. M. A semi-incremental garbage collection algorithm. Software---Practice and Experience 21, 11 (Nov. 1982), 1081--1084.]]","journal-title":"Software---Practice and Experience"},{"key":"e_1_3_2_1_13_1","volume-title":"Garbage Collection: Algorithms for Automatic Dynamic Memory Management","author":"Jones R.","year":"1996","unstructured":"Jones , R. , and Lins , R . Garbage Collection: Algorithms for Automatic Dynamic Memory Management . Wiley , May 1996 . Chapter on distributed collection by Lins.]] Jones, R., and Lins, R. Garbage Collection: Algorithms for Automatic Dynamic Memory Management. Wiley, May 1996. Chapter on distributed collection by Lins.]]"},{"key":"e_1_3_2_1_14_1","first-page":"206","volume-title":"Proceedings of the International Symposium on High Performance Computer Architecture","author":"Karlsson M.","year":"2000","unstructured":"Karlsson , M. , Dahlgren , F. , and Stenstr\u00f6m , P . A prefetching technique for irregular accesses to linked data structures . In Proceedings of the International Symposium on High Performance Computer Architecture ( Toulouse, France, Jan.). IEEE Computer Society , 2000 , pp. 206 -- 217 .]] Karlsson, M., Dahlgren, F., and Stenstr\u00f6m, P. A prefetching technique for irregular accesses to linked data structures. In Proceedings of the International Symposium on High Performance Computer Architecture (Toulouse, France, Jan.). IEEE Computer Society, 2000, pp. 206--217.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/225160.225197"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237190"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291034"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/300979.300989"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Conference on Compiler Construction","volume":"1575","author":"Rubin S.","unstructured":"Rubin , S. , Bernstein , D. , and Rodeh , M . Virtual cache line: A new technique to improve cache exploitation for recursive data structures . In Proceedings of the International Conference on Compiler Construction ( Amsterdam, The Netherlands, Mar.), S. J\u00e4hnichen, Ed. vol. 1575 of Lecture Notes in Computer Science. 1999, pp. 259--273.]] Rubin, S., Bernstein, D., and Rodeh, M. Virtual cache line: A new technique to improve cache exploitation for recursive data structures. In Proceedings of the International Conference on Compiler Construction (Amsterdam, The Netherlands, Mar.), S. J\u00e4hnichen, Ed. vol. 1575 of Lecture Notes in Computer Science. 1999, pp. 259--273.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/320521.320531"},{"key":"e_1_3_2_1_21_1","volume-title":"SPECjvm98 benchmarks","author":"SPEC.","year":"1998","unstructured":"SPEC. SPECjvm98 benchmarks , 1998 . http:\/\/www.spec.org\/osg\/jvm98.]] SPEC. SPECjvm98 benchmarks, 1998. http:\/\/www.spec.org\/osg\/jvm98.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/190.194"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","first-page":"289","volume-title":"Proceedings of the International Conference on Compiler Construction (Genova, Italy, Apr.)","author":"Stoutchinin A.","year":"2027","unstructured":"Stoutchinin , A. , Amaral , J. N. , Gao , G. R. , Dehnert , J. C. , Jain , S. , and Douillet , A . Speculative prefetching of induction pointers . In Proceedings of the International Conference on Compiler Construction (Genova, Italy, Apr.) , R. Wilhelm, Ed. vol. 2027 of Lecture Notes in Computer Science . 2001, pp. 289 -- 303 .]] Stoutchinin, A., Amaral, J. N., Gao, G. R., Dehnert, J. C., Jain, S., and Douillet, A. Speculative prefetching of induction pointers. In Proceedings of the International Conference on Compiler Construction (Genova, Italy, Apr.), R. Wilhelm, Ed. vol. 2027 of Lecture Notes in Computer Science. 2001, pp. 289--303.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808261"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/113446.113461"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/503205.503206"}],"event":{"name":"ASPLOS04: Architectural Support for Programming Languages and Operating Systems","location":"Boston MA USA","acronym":"ASPLOS04","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 11th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024393.1024417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1024393.1024417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:31:35Z","timestamp":1750249895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024393.1024417"}},"subtitle":["hardware analysis and software redesign"],"short-title":[],"issued":{"date-parts":[[2004,10,7]]},"references-count":25,"alternative-id":["10.1145\/1024393.1024417","10.1145\/1024393"],"URL":"https:\/\/doi.org\/10.1145\/1024393.1024417","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1037947.1024417","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1037187.1024417","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1037949.1024417","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,10,7]]},"assertion":[{"value":"2004-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}