{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:42Z","timestamp":1772163942856,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,17]],"date-time":"2010-10-17T00:00:00Z","timestamp":1287273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,17]]},"DOI":"10.1145\/1869459.1869525","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T08:41:35Z","timestamp":1287477695000},"page":"806-821","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Patterns and statistical analysis for understanding reduced resource computing"],"prefix":"10.1145","author":[{"given":"Martin","family":"Rinard","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Henry","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Stelios","family":"Sidiroglou","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542481"},{"key":"e_1_3_2_1_3_1","volume-title":"Biochemistry","author":"Berg J.","year":"2006","unstructured":"}} J. Berg , J. Tymoczko , and L. Stryer . Biochemistry . W.H. Freeman , 2006 . }}J. Berg, J. Tymoczko, and L. Stryer. Biochemistry. W.H. Freeman, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343502"},{"key":"e_1_3_2_1_7_1","volume-title":"Low-energy electron\/atom elastic scattering cross sections from 0.1-30 keV. Scanning, 17(4)","author":"Browning R.","year":"1995","unstructured":"}} R. Browning , T. Li , B. Chui , J. Ye , R. Pease , Z. Czyzewski , and D. Joy . Low-energy electron\/atom elastic scattering cross sections from 0.1-30 keV. Scanning, 17(4) , 1995 . }}R. Browning, T. Li, B. Chui, J. Ye, R. Pease, Z. Czyzewski, and D. Joy. Low-energy electron\/atom elastic scattering cross sections from 0.1-30 keV. Scanning, 17(4), 1995."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949314"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062499"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1090\/psapm\/019\/0235771"},{"key":"e_1_3_2_1_12_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma E.","year":"1995","unstructured":"}} E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design Patterns: Elements of Reusable Object-Oriented Software . Addison-Wesley , 1995 . }}E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1190\/1.1890353"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/103085.103090"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296912"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183401.1183447"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297055"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949402"},{"key":"e_1_3_2_1_25_1","volume-title":"William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04","author":"Rinard M.","unstructured":"}} M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04 . }}M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04."},{"key":"e_1_3_2_1_26_1","volume-title":"Jade: A high-level, machine-independent language for parallel programming. parallel computing, 29","author":"Rinard M.","year":"1993","unstructured":"}} M. Rinard , D. Scales , and M. Lam . Jade: A high-level, machine-independent language for parallel programming. parallel computing, 29 , 1993 . }}M. Rinard, D. Scales, and M. Lam. Jade: A high-level, machine-independent language for parallel programming. parallel computing, 29, 1993."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094866"},{"key":"e_1_3_2_1_29_1","series-title":"Series B, Biological Sciences, 211(1184)","volume-title":"Desaturation of exhaled air in camels. Proceedings of the Royal Society of London","author":"Schmidt-Nielsen K.","year":"1981","unstructured":"}} K. Schmidt-Nielsen , R. Schroter , and A. Shkolnik . Desaturation of exhaled air in camels. Proceedings of the Royal Society of London , Series B, Biological Sciences, 211(1184) , 1981 . }}K. Schmidt-Nielsen, R. Schroter, and A. Shkolnik. Desaturation of exhaled air in camels. Proceedings of the Royal Society of London, Series B, Biological Sciences, 211(1184), 1981."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX '05","author":"Sidiroglou S.","unstructured":"}} S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In USENIX '05 . }}S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In USENIX '05."}],"event":{"name":"SPLASH '10: Systems Programming Languages and Applications: Software for Humanity","location":"Reno\/Tahoe Nevada USA","acronym":"SPLASH '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the ACM international conference on Object oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1869459.1869525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1869459.1869525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:08:15Z","timestamp":1750234095000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1869459.1869525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,17]]},"references-count":27,"alternative-id":["10.1145\/1869459.1869525","10.1145\/1869459"],"URL":"https:\/\/doi.org\/10.1145\/1869459.1869525","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1932682.1869525","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,10,17]]},"assertion":[{"value":"2010-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}