{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T07:23:36Z","timestamp":1766820216156,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T00:00:00Z","timestamp":1357689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,9]]},"DOI":"10.1145\/2422436.2422470","type":"proceedings-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T12:58:22Z","timestamp":1357217902000},"page":"283-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["An energy complexity model for algorithms"],"prefix":"10.1145","author":[{"given":"Swapnoneel","family":"Roy","sequence":"first","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, NY, USA"}]},{"given":"Atri","family":"Rudra","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, NY, USA"}]},{"given":"Akshat","family":"Verma","sequence":"additional","affiliation":[{"name":"IBM Research - India, New Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2013,1,9]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Calculating memory system power for DDR3. http:\/\/download.micron.com\/pdf\/technotes\/ddr3\/TN41_01DDRPower.pdf.  Calculating memory system power for DDR3. http:\/\/download.micron.com\/pdf\/technotes\/ddr3\/TN41_01DDRPower.pdf."},{"key":"e_1_3_2_2_2_1","unstructured":"Data center energy consumption trends. http:\/\/www1.eere.energy.gov\/femp\/program\/dc_energy_consumption.html.  Data center energy consumption trends. http:\/\/www1.eere.energy.gov\/femp\/program\/dc_energy_consumption.html."},{"key":"e_1_3_2_2_3_1","unstructured":"Hardware monitor. http:\/\/www.bresink.de\/osx\/HardwareMonitor.html.  Hardware monitor. http:\/\/www.bresink.de\/osx\/HardwareMonitor.html."},{"key":"e_1_3_2_2_4_1","unstructured":"Joulemeter: Computational energy measurement and optimization. http:\/\/research.microsoft.com\/en-us\/projects\/joulemeter\/http:\/\/research.microsoft.com\/en-us\/projects\/joulemeter\/.  Joulemeter: Computational energy measurement and optimization. http:\/\/research.microsoft.com\/en-us\/projects\/joulemeter\/http:\/\/research.microsoft.com\/en-us\/projects\/joulemeter\/."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/48529.48535"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735245"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1206035.1206038"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(97)00015-X"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566736"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-010-9285-4"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502045"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796479"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989493.1989555"},{"key":"e_1_3_2_2_14_1","volume-title":"Spring","author":"Gupta A.","year":"2009","unstructured":"A. Gupta . Balls and bins and the power of 2 choices , Spring 2009 . http:\/\/www.cs.cmu.edu\/afs\/cs.cmu.edu\/academic\/class\/\\\\15859m-s11\/www\/lectures\/lect0202.pdf. A. Gupta. Balls and bins and the power of 2 choices, Spring 2009. http:\/\/www.cs.cmu.edu\/afs\/cs.cmu.edu\/academic\/class\/\\\\15859m-s11\/www\/lectures\/lect0202.pdf."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1003"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.862725"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-008-9267-y"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/08073408X"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. HPCA","author":"Kim W.","year":"2008","unstructured":"W. Kim , M. S. Gupta , G.-Y. Wei , , and D. Brooks . System level analysis of fast, per-core dvfs using on-chip switching regulators . In Proc. HPCA , 2008 . W. Kim, M. S. Gupta, G.-Y. Wei, , and D. Brooks. System level analysis of fast, per-core dvfs using on-chip switching regulators. In Proc. HPCA, 2008."},{"key":"e_1_3_2_2_20_1","volume-title":"The Art of Computer Programming, Volume II: Seminumerical Algorithms","author":"Knuth D. E.","year":"1969","unstructured":"D. E. Knuth . The Art of Computer Programming, Volume II: Seminumerical Algorithms . Addison-Wesley , 1969 . D. E. Knuth. The Art of Computer Programming, Volume II: Seminumerical Algorithms. Addison-Wesley, 1969."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809049.1809055"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810479.1810510"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.84"},{"key":"e_1_3_2_2_24_1","volume-title":"Algorithmica","author":"Mehlhorn K.","year":"2003","unstructured":"K. Mehlhorn and P. Sanders . Scanning multiple sequences via cache memory . In Algorithmica , 2003 . K. Mehlhorn and P. Sanders. Scanning multiple sequences via cache memory. In Algorithmica, 2003."},{"key":"e_1_3_2_2_25_1","first-page":"255","volume-title":"The power of two random choices: A survey of techniques and results. In in Handbook of Randomized Computing","author":"Mitzenmacher M.","year":"2000","unstructured":"M. Mitzenmacher , A. W. Richa , and R. Sitaraman . The power of two random choices: A survey of techniques and results. In in Handbook of Randomized Computing , pages 255 -- 312 . Kluwer , 2000 . M. Mitzenmacher, A. W. Richa, and R. Sitaraman. The power of two random choices: A survey of techniques and results. In in Handbook of Randomized Computing, pages 255--312. Kluwer, 2000."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000002"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294287"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.20"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2004.04.003"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566735"},{"key":"e_1_3_2_2_31_1","volume-title":"Proc. Usenix ATC","author":"Verma A.","year":"2009","unstructured":"A. Verma , G. Dasgupta , T. Nayak , P. De , and R. Kothari . Server workload analysis for power minimization using consolidation . In Proc. Usenix ATC , 2009 . A. Verma, G. Dasgupta, T. Nayak, P. De, and R. Kothari. Server workload analysis for power minimization using consolidation. In Proc. Usenix ATC, 2009."},{"key":"e_1_3_2_2_32_1","volume-title":"Proc. of Usenix FAST","author":"Verma A.","year":"2010","unstructured":"A. Verma , R. Koller , L. Useche , and R. Rangaswami . Srcmap: energy proportional storage using dynamic consolidation . In Proc. of Usenix FAST , 2010 . A. Verma, R. Koller, L. Useche, and R. Rangaswami. Srcmap: energy proportional storage using dynamic consolidation. In Proc. of Usenix FAST, 2010."},{"key":"e_1_3_2_2_33_1","unstructured":"J. S. Vitter. Algorithms and data structures for external memory 2008.   J. S. Vitter. Algorithms and data structures for external memory 2008."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01185207"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01185208"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796264"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605411"}],"event":{"name":"ITCS '13: Innovations in Theoretical Computer Science","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Berkeley California USA","acronym":"ITCS '13"},"container-title":["Proceedings of the 4th conference on Innovations in Theoretical Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422436.2422470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2422436.2422470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:14Z","timestamp":1750277654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422436.2422470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,9]]},"references-count":37,"alternative-id":["10.1145\/2422436.2422470","10.1145\/2422436"],"URL":"https:\/\/doi.org\/10.1145\/2422436.2422470","relation":{},"subject":[],"published":{"date-parts":[[2013,1,9]]},"assertion":[{"value":"2013-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}