{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:47Z","timestamp":1750307987764,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2005,9,17]],"date-time":"2005-09-17T00:00:00Z","timestamp":1126915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGARCH Comput. Archit. News"],"published-print":{"date-parts":[[2006,3]]},"abstract":"<jats:p>Reference counting is a garbage-collection technique that maintains a per-object count of the number of pointers to that object. When the count reaches zero, the object must be dead and can be collected. Although it is cannot detect all garbage on its own, it is well suited for some applications and is implemented typically in conjunction with other methods to increase overall precision. A disadvantage of reference counting is the extra storage traffic that is introduced. In this paper, we describe a new cache write-back policy that can substantially decrease the reference-counting traffic to RAM.We investigate a cache design that takes advantage of temporally silent stores, by remebering the first-fetched value of a cache subblock, so that the subblock need not be written back to RAM unless a different value is present. We present results from experiments that show the effectiveness of this approach, particularly in mitigating the storage traffic due to reference counting.<\/jats:p>","DOI":"10.1145\/1147349.1147353","type":"journal-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:35:32Z","timestamp":1161210932000},"page":"3-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dusty caches for reference counting garbage collection"],"prefix":"10.1145","volume":"34","author":[{"given":"Scott","family":"Friedman","sequence":"first","affiliation":[{"name":"Washington University, St. Louis, MO"}]},{"given":"Praveen","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"Washington University, St. Louis, MO"}]},{"given":"Roger","family":"Chamberlain","sequence":"additional","affiliation":[{"name":"Washington University, St. Louis, MO"}]},{"given":"Ron K.","family":"Cytron","sequence":"additional","affiliation":[{"name":"Washington University, St. Louis, MO"}]},{"given":"Jason E.","family":"Fritts","sequence":"additional","affiliation":[{"name":"Washington University, St. Louis, MO"}]}],"member":"320","published-online":{"date-parts":[[2005,9,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/517554.825791"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/367487.367501"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/998685.1006992"},{"key":"e_1_2_1_4_1","volume-title":"August","author":"Port Extender Homepage Field Programmable","year":"2001","unstructured":"Field Programmable Port Extender Homepage . Online http:\/\/www.ar1.wust1.edu\/ar1\/projects\/fpx\/ , August 2001 . Field Programmable Port Extender Homepage. Online http:\/\/www.ar1.wust1.edu\/ar1\/projects\/fpx\/, August 2001."},{"key":"e_1_2_1_5_1","volume-title":"The leon processor. www.gaisler.com","author":"Gaissler Jiri","year":"2005","unstructured":"Jiri Gaissler . The leon processor. www.gaisler.com , 2005 . Jiri Gaissler. The leon processor. www.gaisler.com, 2005."},{"key":"e_1_2_1_6_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma Erich","year":"1995","unstructured":"Erich Gamma , Richard Helm , Ralph Johnson , and John Vlissides . Design Patterns: Elements of Reusable Object-Oriented Software . Addison-Wesley , Reading, MA , 1995 . Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading, MA, 1995."},{"key":"e_1_2_1_7_1","volume-title":"The SPARC Architecture Manual Version 8","author":"International SPARC","year":"1992","unstructured":"SPARC International . The SPARC Architecture Manual Version 8 . Prentice-Hall , Englewood Cliffs , New Jersey, 1992 . SPARC International. The SPARC Architecture Manual Version 8. Prentice-Hall, Englewood Cliffs, New Jersey, 1992."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2004.1303228"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/360128.360133"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605401"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504309"},{"key":"e_1_2_1_12_1","volume-title":"The Java Virtual Machine Specification","author":"Lindholm Tom","year":"1997","unstructured":"Tom Lindholm and Frank Yellin . The Java Virtual Machine Specification . Addison-Wesley , Reading, Massachusetts , 1997 . Tom Lindholm and Frank Yellin. The Java Virtual Machine Specification. Addison-Wesley, Reading, Massachusetts, 1997."},{"key":"e_1_2_1_13_1","volume-title":"Los Alamos Science","author":"Metropolis N.","year":"1987","unstructured":"N. Metropolis . The beginning of the monte-carlo method . Los Alamos Science , 1987 . N. Metropolis. The beginning of the monte-carlo method. Los Alamos Science, 1987."},{"key":"e_1_2_1_15_1","volume-title":"Specjvm98 benchmarks. www.spec.org\/osg\/jvm98","author":"SPEC.","year":"1998","unstructured":"SPEC. Specjvm98 benchmarks. www.spec.org\/osg\/jvm98 , 1998 . SPEC. Specjvm98 benchmarks. www.spec.org\/osg\/jvm98, 1998."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/645648.664824"}],"container-title":["ACM SIGARCH Computer Architecture News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1147349.1147353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1147349.1147353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:12Z","timestamp":1750259172000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1147349.1147353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,17]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,3]]}},"alternative-id":["10.1145\/1147349.1147353"],"URL":"https:\/\/doi.org\/10.1145\/1147349.1147353","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1152779.1147353","asserted-by":"subject"}]},"ISSN":["0163-5964"],"issn-type":[{"type":"print","value":"0163-5964"}],"subject":[],"published":{"date-parts":[[2005,9,17]]},"assertion":[{"value":"2005-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}