{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:47:34Z","timestamp":1763466454014,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,12]],"date-time":"2005-06-12T00:00:00Z","timestamp":1118534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,12]]},"DOI":"10.1145\/1111583.1111585","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"5-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Recursive data structure profiling"],"prefix":"10.1145","author":[{"given":"Easwaran","family":"Raman","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"David I.","family":"August","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]}],"member":"320","published-online":{"date-parts":[[2005,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291036"},{"key":"e_1_3_2_1_3_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"1992","unstructured":"Cormen , T. H. , Leiserson , C. E. , and Rivest , R. L . Introduction to Algorithms . The MIT Press and McGraw-Hill , 1992 . Cormen, T. H., Leiserson, C. E., and Rivest, R. L. Introduction to Algorithms. The MIT Press and McGraw-Hill, 1992."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237724"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040331"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/545381.545384"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/773146.773041"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/300979.300987"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 28th International Symposium on Computer Architecture (September","author":"Nystrom E. M.","year":"2001","unstructured":"Nystrom , E. M. , Ju , R. D. , and Hwu , W. W . Characterization of repeating data access patterns in integer benchmarks . In Proceedings of the 28th International Symposium on Computer Architecture (September 2001 ). Nystrom, E. M., Ju, R. D., and Hwu, W. W. Characterization of repeating data access patterns in integer benchmarks. In Proceedings of the 28th International Symposium on Computer Architecture (September 2001)."},{"key":"e_1_3_2_1_12_1","volume-title":"Online algorithms for topological order and strongly connected components. Tech. rep","author":"Pearce D. J.","year":"2003","unstructured":"Pearce , D. J. , and Kelly , P. H. J . Online algorithms for topological order and strongly connected components. Tech. rep ., Imperial College , September 2003 . Pearce, D. J., and Kelly, P. H. J. Online algorithms for topological order and strongly connected components. Tech. rep., Imperial College, September 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27864-1_18"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237725"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/774861.774891"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the International Symposium on Code Generation and Optimization","author":"Wu Q.","year":"2004","unstructured":"Wu , Q. , Pyatakov , A. , Spiridonov , A. N. , Raman , E. , Clark , D. W. , and August , D. I . Exposing memory access regularities using object-relative memory profiling . In Proceedings of the International Symposium on Code Generation and Optimization ( 2004 ), IEEE Computer Society. Wu, Q., Pyatakov, A., Spiridonov, A. N., Raman, E., Clark, D. W., and August, D. I. Exposing memory access regularities using object-relative memory profiling. In Proceedings of the International Symposium on Code Generation and Optimization (2004), IEEE Computer Society."}],"event":{"name":"MSP05: Memory Systems Performance Workshop","acronym":"MSP05","location":"Chicago Illinois"},"container-title":["Proceedings of the 2005 workshop on Memory system performance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111583.1111585","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1111583.1111585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:24Z","timestamp":1750262904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111583.1111585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,12]]},"references-count":14,"alternative-id":["10.1145\/1111583.1111585","10.1145\/1111583"],"URL":"https:\/\/doi.org\/10.1145\/1111583.1111585","relation":{},"subject":[],"published":{"date-parts":[[2005,6,12]]},"assertion":[{"value":"2005-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}