{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:34Z","timestamp":1772164054872,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,16]],"date-time":"2013-06-16T00:00:00Z","timestamp":1371340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,16]]},"DOI":"10.1145\/2491956.2462171","type":"proceedings-article","created":{"date-parts":[[2013,6,11]],"date-time":"2013-06-11T12:03:50Z","timestamp":1370952230000},"page":"297-308","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Using managed runtime systems to tolerate holes in wearable memories"],"prefix":"10.1145","author":[{"given":"Tiejun","family":"Gao","sequence":"first","affiliation":[{"name":"Australian National University, Camberra, Australia"}]},{"given":"Karin","family":"Strauss","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, USA"}]},{"given":"Stephen M.","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Australian National University, Camberra, Australia"}]},{"given":"Kathryn S.","family":"McKinley","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, USA"}]},{"given":"Doug","family":"Burger","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, USA"}]},{"given":"James","family":"Larus","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/780732.780744"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379232"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375586"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005693"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_6_1","unstructured":"H.-J. Boehm. Conservative GC algorithmic overview. http:\/\/www.hpl.hp.com\/personal\/Hans\\_Boehm\/gc\/gcdescr.html.  H.-J. Boehm. Conservative GC algorithmic overview. http:\/\/www.hpl.hp.com\/personal\/Hans\\_Boehm\/gc\/gcdescr.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629589"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/96709.96735"},{"key":"e_1_3_2_1_9_1","unstructured":"Avoiding server downtime from hardware errors in system memory with HP Memory Quarantine. Hewlett-Packard Corporation.  Avoiding server downtime from hardware errors in system memory with HP Memory Quarantine. Hewlett-Packard Corporation."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1028983"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736023"},{"key":"e_1_3_2_1_12_1","volume-title":"International Technology Roadmap for Semiconductors","author":"ITRS Working Group","year":"2011","unstructured":"ITRS Working Group . ITRS report. Technical report , International Technology Roadmap for Semiconductors , 2011 . ITRS Working Group. ITRS report. Technical report, International Technology Roadmap for Semiconductors, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Dec.","author":"RVM.","year":"2011","unstructured":"Jikes RVM. phCompiler Replay , Dec. 2011 . http:\/\/jikesrvm.org\/Exper-imental+Guidelines. Jikes RVM. phCompiler Replay, Dec. 2011. http:\/\/jikesrvm.org\/Exper-imental+Guidelines."},{"key":"e_1_3_2_1_14_1","unstructured":"D. Lea. A memory allocator. http:\/\/g.oswego.edu\/dl\/html\/malloc.html.  D. Lea. A memory allocator. http:\/\/g.oswego.edu\/dl\/html\/malloc.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Micron Technology Inc. PCM-based MCP. http:\/\/www.micron.com\/ products\/multichip-packages\/pcm-based-mcp?source=mb.  Micron Technology Inc. PCM-based MCP. http:\/\/www.micron.com\/ products\/multichip-packages\/pcm-based-mcp?source=mb."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155658"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669117"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555760"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.524.0465"},{"key":"e_1_3_2_1_20_1","volume-title":"Extreme scale computing. Keynote Speech at the 39th International Symposium on Computer Architecture","author":"Rattner J.","year":"2012","unstructured":"J. Rattner . Extreme scale computing. Keynote Speech at the 39th International Symposium on Computer Architecture , 2012 . J. Rattner. Extreme scale computing. Keynote Speech at the 39th International Symposium on Computer Architecture, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806649"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815980"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.46"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048092"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2014698.2014881"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555759"}],"event":{"name":"PLDI '13: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Seattle Washington USA","acronym":"PLDI '13","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491956.2462171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491956.2462171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:28:41Z","timestamp":1750217321000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491956.2462171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,16]]},"references-count":26,"alternative-id":["10.1145\/2491956.2462171","10.1145\/2491956"],"URL":"https:\/\/doi.org\/10.1145\/2491956.2462171","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2499370.2462171","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,6,16]]},"assertion":[{"value":"2013-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}