{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:45:05Z","timestamp":1759146305014,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,5,4]]},"DOI":"10.1145\/1062261.1062321","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"371-377","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Exploiting temporal locality in drowsy cache policies"],"prefix":"10.1145","author":[{"given":"Salvador","family":"Petit","sequence":"first","affiliation":[{"name":"Polytechnic University of Valencia, Valencia, Spain"}]},{"given":"Julio","family":"Sahuquillo","sequence":"additional","affiliation":[{"name":"Polytechnic University of Valencia, Valencia, Spain"}]},{"given":"Jose M.","family":"Such","sequence":"additional","affiliation":[{"name":"Polytechnic University of Valencia, Valencia, Spain"}]},{"given":"David","family":"Kaeli","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA"}]}],"member":"320","published-online":{"date-parts":[[2005,5,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume":"2","author":"Albonesi","year":"2000","unstructured":"Albonesi , D. H. Selective Cache Ways: On-Demand Cache Resource Allocation. Journal of Instruction-Level Parallelism , Vol. 2 , 2000 . Albonesi, D. H. Selective Cache Ways: On-Demand Cache Resource Allocation. Journal of Instruction-Level Parallelism, Vol. 2, 2000.","journal-title":"Journal of Instruction-Level Parallelism"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/268806.268810"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2004.10010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/774861.774896"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/545215.545232"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/379240.379268"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.755465"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2002.8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645989.674306"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the 2004 Design, Automation and Test in Europe Conf.","author":"Li Y.","year":"2004","unstructured":"Li , Y. , Parikh , D. , Zhang , Y. , Sankaranarayanan , K. , Stan , M. R. , and Skadron , K . State-Preserving vs. Non-State-Preserving Leakage Control in Caches . Proc. of the 2004 Design, Automation and Test in Europe Conf. , Feb. 2004 . Li, Y., Parikh, D., Zhang, Y., Sankaranarayanan, K., Stan, M. R., and Skadron, K. State-Preserving vs. Non-State-Preserving Leakage Control in Caches. Proc. of the 2004 Design, Automation and Test in Europe Conf., Feb. 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2003.1196114"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/344166.344526"},{"key":"e_1_3_2_1_13_1","volume-title":"International Technology Roadmap for Semiconductors","author":"SIA","year":"2001","unstructured":"SIA , International Technology Roadmap for Semiconductors , 2001 . SIA, International Technology Roadmap for Semiconductors, 2001."},{"key":"e_1_3_2_1_14_1","unstructured":"Standard Performance Evaluation Corporation. http:\/\/www.spec.org\/cpu2000\/  Standard Performance Evaluation Corporation. http:\/\/www.spec.org\/cpu2000\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.811113"}],"event":{"name":"CF05: Computing Frontiers Conference","sponsor":["ACM Association for Computing Machinery","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Ischia Italy","acronym":"CF05"},"container-title":["Proceedings of the 2nd conference on Computing frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1062261.1062321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T04:08:00Z","timestamp":1673410080000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1062261.1062321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,4]]},"references-count":15,"alternative-id":["10.1145\/1062261.1062321","10.1145\/1062261"],"URL":"https:\/\/doi.org\/10.1145\/1062261.1062321","relation":{},"subject":[],"published":{"date-parts":[[2005,5,4]]},"assertion":[{"value":"2005-05-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}