{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:15Z","timestamp":1772164035781,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,3]],"date-time":"2012-03-03T00:00:00Z","timestamp":1330732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,3]]},"DOI":"10.1145\/2150976.2151002","type":"proceedings-article","created":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T08:18:26Z","timestamp":1331021906000},"page":"235-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Optimal task assignment in multithreaded processors"],"prefix":"10.1145","author":[{"given":"Petar","family":"Radojkovi\u0107","sequence":"first","affiliation":[{"name":"Barcelona Supercomputing Center, Barcelona, Spain"}]},{"given":"Vladimir","family":"\u010cakarevi\u0107","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center, Barcelona, Spain"}]},{"given":"Miquel","family":"Moret\u00f3","sequence":"additional","affiliation":[{"name":"Universitat Politecnica de Catalunya &amp; Barcelona Supercomputing Center, Barcelona, Spain"}]},{"given":"Javier","family":"Verd\u00fa","sequence":"additional","affiliation":[{"name":"Universitat Politecnica de Catalunya, Barcelona, Spain"}]},{"given":"Alex","family":"Pajuelo","sequence":"additional","affiliation":[{"name":"Universitat Politecnica de Catalunya, Barcelona, Spain"}]},{"given":"Francisco J.","family":"Cazorla","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center &amp; Spanish National Research Council (IIIA-CSIC), Barcelona, Spain"}]},{"given":"Mario","family":"Nemirovsky","sequence":"additional","affiliation":[{"name":"ICREA Research Professor at Barcelona Supercomputing Center, Barcelona, Spain"}]},{"given":"Mateo","family":"Valero","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center &amp; Universitat Politecnica de Catalunya, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2012,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"OpenSPARC\u2122 T2 Core Microarchitecture Specification. Sun Microsystems Inc 2007.  OpenSPARC\u2122 T2 Core Microarchitecture Specification. Sun Microsystems Inc 2007."},{"key":"e_1_3_2_1_2_1","unstructured":"OpenSPARC\u2122 T2 System-On-Chip (SOC) Microarchitecture Specification. Sun Microsystems Inc 2007.  OpenSPARC\u2122 T2 System-On-Chip (SOC) Microarchitecture Specification. Sun Microsystems Inc 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"Sun Microsystems","author":"Plane Software Netra Data","year":"2008","unstructured":"Netra Data Plane Software Suite 2. 0 Update 2 Reference Manual . Sun Microsystems , Inc , 2008 . Netra Data Plane Software Suite 2.0 Update 2 Reference Manual. Sun Microsystems, Inc, 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"Sun Microsystems","author":"Plane Software Netra Data","year":"2008","unstructured":"Netra Data Plane Software Suite 2. 0 Update 2 User's Guide . Sun Microsystems , Inc , 2008 . Netra Data Plane Software Suite 2.0 Update 2 User's Guide. Sun Microsystems, Inc, 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/www.oracle.com\/ocom\/groups\/public\/@ocom\/documents \/webcontent\/044518.pdf","year":"2010","unstructured":"Software. Hardware. Complete. http:\/\/www.oracle.com\/ocom\/groups\/public\/@ocom\/documents \/webcontent\/044518.pdf , 2010 . Software. Hardware. Complete. http:\/\/www.oracle.com\/ocom\/groups\/public\/@ocom\/documents \/webcontent\/044518.pdf, 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBAC-PAD.2009.13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_8_1","volume-title":"Statistical Inference Based on the Likelihood","author":"Azzalini A.","year":"1996","unstructured":"A. Azzalini . Statistical Inference Based on the Likelihood . Chapman and Hall , London , 1996 . A. Azzalini. Statistical Inference Based on the Likelihood. Chapman and Hall, London, 1996."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176996548"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/0470012382"},{"key":"e_1_3_2_1_11_1","volume-title":"Extreme value theory in engineering","author":"Castillo E.","year":"1988","unstructured":"E. Castillo . Extreme value theory in engineering . Academic Press, Inc. , 1988 . E. Castillo. Extreme value theory in engineering. Academic Press, Inc., 1988."},{"key":"e_1_3_2_1_12_1","first-page":"92","article-title":"Fitting the Generalized Pareto Distribution to data","author":"Castillo E.","year":"1997","unstructured":"E. Castillo and A. Hadi . Fitting the Generalized Pareto Distribution to data . Journal of the American Statistical Association , 92 , 1997 . E. Castillo and A. Hadi. Fitting the Generalized Pareto Distribution to data. Journal of the American Statistical Association, 92, 1997.","journal-title":"Journal of the American Statistical Association"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.27"},{"key":"e_1_3_2_1_14_1","volume-title":"Cengage Learning","author":"Chapman S. J.","year":"2009","unstructured":"S. J. Chapman . Essentials of MATLAB Programming . Cengage Learning , 2009 . S. J. Chapman. Essentials of MATLAB Programming. Cengage Learning, 2009."},{"key":"e_1_3_2_1_15_1","first-page":"25","article-title":"On the distribution of the likelihood ratio","author":"Chernoff H.","year":"1954","unstructured":"H. Chernoff . On the distribution of the likelihood ratio . Annals of Mathematical Statistics , 25 , 1954 . H. Chernoff. On the distribution of the likelihood ratio. Annals of Mathematical Statistics, 25, 1954.","journal-title":"Annals of Mathematical Statistics"},{"key":"e_1_3_2_1_16_1","volume-title":"Wiley","author":"Cochran W. G.","year":"1977","unstructured":"W. G. Cochran . Sampling techniques . Wiley , 1977 . W. G. Cochran. Sampling techniques. Wiley, 1977."},{"key":"e_1_3_2_1_17_1","volume-title":"Law of Internet Security and Privacy","author":"Connolly K. J.","year":"2003","unstructured":"K. J. Connolly . Law of Internet Security and Privacy . Aspen Publishers , 2003 . K. J. Connolly. Law of Internet Security and Privacy. Aspen Publishers, 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1898953.1899070"},{"key":"e_1_3_2_1_19_1","volume-title":"Hash Tables for Efficient Flow Monitoring: Vulnerabilities and Countermeasures. In LCN '09: Proceedings of the 34th Conference on Local Computer Networks","author":"Eckhoff D.","year":"2009","unstructured":"D. Eckhoff , T. Limmer , and F. Dressler . Hash Tables for Efficient Flow Monitoring: Vulnerabilities and Countermeasures. In LCN '09: Proceedings of the 34th Conference on Local Computer Networks , 2009 . D. Eckhoff, T. Limmer, and F. Dressler. Hash Tables for Efficient Flow Monitoring: Vulnerabilities and Countermeasures. In LCN '09: Proceedings of the 34th Conference on Local Computer Networks, 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1898953.1899072"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508260"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736033"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247386"},{"key":"e_1_3_2_1_24_1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson . Computers and Intractability: A Guide to the Theory of NP-Completeness . W.H. Freeman and Company , 1979 . M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, 1979."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10614-006-9025-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2004.1433800"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"The natural duration of cancer","volume":"33","author":"Greenwood M.","year":"1926","unstructured":"M. Greenwood . The natural duration of cancer . Reports on Public Health and Medical Subjects , 33 : 1 -- 26 , 1926 . M. Greenwood. The natural duration of cancer. Reports on Public Health and Medical Subjects, 33: 1--26, 1926.","journal-title":"Reports on Public Health and Medical Subjects"},{"key":"e_1_3_2_1_28_1","first-page":"35","article-title":"Computing the maximum likelihood estimates for the Generalized Pareto Distribution to data","author":"Grimshaw S.","year":"1993","unstructured":"S. Grimshaw . Computing the maximum likelihood estimates for the Generalized Pareto Distribution to data . Technometrics , 35 , 1993 . S. Grimshaw. Computing the maximum likelihood estimates for the Generalized Pareto Distribution to data. Technometrics, 35, 1993.","journal-title":"Technometrics"},{"key":"e_1_3_2_1_29_1","volume-title":"RPE Report","author":"Guo F.","year":"2004","unstructured":"F. Guo and T. Chiueh . Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System . In RPE Report , 2004 . F. Guo and T. Chiueh. Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System. In RPE Report, 2004."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/1269343"},{"key":"e_1_3_2_1_31_1","unstructured":"Internet Engineering Task Force (IETF). Request for Comments (RFC) http:\/\/www.rfc-editor.org\/.  Internet Engineering Task Force (IETF). Request for Comments (RFC) http:\/\/www.rfc-editor.org\/."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/827272.829142"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454146"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1958.10501452"},{"key":"e_1_3_2_1_35_1","series-title":"Fame research paper series","volume-title":"Extreme value theory for tail-related risk measures","author":"Kellezi E.","year":"2000","unstructured":"E. Kellezi and M. Gilli . Extreme value theory for tail-related risk measures . Fame research paper series , International Center for Financial Asset Management and Engineering , 2000 . E. Kellezi and M. Gilli. Extreme value theory for tail-related risk measures. Fame research paper series, International Center for Financial Asset Management and Engineering, 2000."},{"key":"e_1_3_2_1_36_1","first-page":"7","article-title":"Understanding the impact of inter-thread cache interference on ILP in modern SMT processors","author":"Kihm J.","year":"2005","unstructured":"J. Kihm , A. Settle , A. Janiszewski , and D. A. Connors . Understanding the impact of inter-thread cache interference on ILP in modern SMT processors . The Journal of Instruction Level Parallelism , 7 , 2005 . J. Kihm, A. Settle, A. Janiszewski, and D. A. Connors. Understanding the impact of inter-thread cache interference on ILP in modern SMT processors. The Journal of Instruction Level Parallelism, 7, 2005.","journal-title":"The Journal of Instruction Level Parallelism"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972393"},{"key":"e_1_3_2_1_38_1","volume-title":"ISCA '04: Proceedings of the 31st Annual International Symposium on Computer Architecture","author":"Kumar R.","year":"2004","unstructured":"R. Kumar , D. M. Tullsen , P. Ranganathan , N. P. Jouppi , and K. I. Farkas . Single-ISA heterogenous multi-core architectures for multithreaded workload performance . In ISCA '04: Proceedings of the 31st Annual International Symposium on Computer Architecture , 2004 . R. Kumar, D. M. Tullsen, P. Ranganathan, N. P. Jouppi, and K. I. Farkas. Single-ISA heterogenous multi-core architectures for multithreaded workload performance. In ISCA '04: Proceedings of the 31st Annual International Symposium on Computer Architecture, 2004."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.390"},{"key":"e_1_3_2_1_40_1","unstructured":"M. Norton. Optimizing Pattern Matching for Intrusion Detection http:\/\/docs.idsresearch.org\/OptimizingPatternMatchingForIDS.pdf 2004.  M. Norton. Optimizing Pattern Matching for Intrusion Detection http:\/\/docs.idsresearch.org\/OptimizingPatternMatchingForIDS.pdf 2004."},{"key":"e_1_3_2_1_41_1","unstructured":"Probe network monitor. http:\/\/www.ntop.org.  Probe network monitor. http:\/\/www.ntop.org."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1048935.1050204"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343003"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693480"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025127.1025997"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531793.1531804"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859652"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375527.1375554"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379244"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511343"},{"key":"e_1_3_2_1_51_1","unstructured":"Snort network intrusion prevention and detection system. http:\/\/www.snort.org\/.  Snort network intrusion prevention and detection system. http:\/\/www.snort.org\/."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273004"},{"key":"e_1_3_2_1_54_1","unstructured":"TCPDUMP\/LIBPCAP public repository. http:\/\/www.tcpdump.org\/.  TCPDUMP\/LIBPCAP public repository. http:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_55_1","volume-title":"Statistics for Engineering Problem Solving","author":"Vardeman S. B.","year":"1993","unstructured":"S. B. Vardeman . Statistics for Engineering Problem Solving . PWS publishing company, 1993 . S. B. Vardeman. Statistics for Engineering Problem Solving. PWS publishing company, 1993."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669173"},{"key":"e_1_3_2_1_58_1","unstructured":"Vermont (VERsatile MONitoring Toolkit). http:\/\/vermont.berlios.de\/.  Vermont (VERsatile MONitoring Toolkit). http:\/\/vermont.berlios.de\/."},{"key":"e_1_3_2_1_59_1","first-page":"9","article-title":"The large-sample distribution of the likelihood ratio for testing composite hypotheses","author":"Wilks S. S.","year":"1938","unstructured":"S. S. Wilks . The large-sample distribution of the likelihood ratio for testing composite hypotheses . Annals of Mathematical Statistics , 9 , 1938 . S. S. Wilks. The large-sample distribution of the likelihood ratio for testing composite hypotheses. Annals of Mathematical Statistics, 9, 1938.","journal-title":"Annals of Mathematical Statistics"},{"key":"e_1_3_2_1_60_1","volume-title":"Princeton University Press","author":"Wilks S. S.","year":"1943","unstructured":"S. S. Wilks . Mathematical Statistics . Princeton University Press , 1943 . S. S. Wilks. Mathematical Statistics. Princeton University Press, 1943."},{"key":"e_1_3_2_1_61_1","unstructured":"Wireshark network protocol analyzer. http:\/\/www.wireshark.org\/.  Wireshark network protocol analyzer. http:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095890.1095901"}],"event":{"name":"ASPLOS'12: Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems","location":"London England, UK","acronym":"ASPLOS'12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2151002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2150976.2151002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:54:44Z","timestamp":1750226084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2151002"}},"subtitle":["a statistical approach"],"short-title":[],"issued":{"date-parts":[[2012,3,3]]},"references-count":60,"alternative-id":["10.1145\/2150976.2151002","10.1145\/2150976"],"URL":"https:\/\/doi.org\/10.1145\/2150976.2151002","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2189750.2151002","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2248487.2151002","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,3,3]]},"assertion":[{"value":"2012-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}