{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:58:37Z","timestamp":1775638717076,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,24]],"date-time":"2016-01-24T00:00:00Z","timestamp":1453593600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE SC0010473"],"award-info":[{"award-number":["DE SC0010473"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006235","name":"Lawrence Berkely National Laboratory","doi-asserted-by":"publisher","award":["Subcontract 7106218"],"award-info":[{"award-number":["Subcontract 7106218"]}],"id":[{"id":"10.13039\/100006235","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,24]]},"DOI":"10.1145\/2688500.2688503","type":"proceedings-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T09:12:26Z","timestamp":1422436346000},"page":"215-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["High performance locks for multi-level NUMA systems"],"prefix":"10.1145","author":[{"given":"Milind","family":"Chabbi","sequence":"first","affiliation":[{"name":"Rice University, USA"}]},{"given":"Michael","family":"Fagan","sequence":"additional","affiliation":[{"name":"Rice University, USA"}]},{"given":"John","family":"Mellor-Crummey","sequence":"additional","affiliation":[{"name":"Rice University, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,1,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. Linux Symposium","author":"Boyd-Wickizer S.","year":"2012","unstructured":"S. Boyd-Wickizer, M. F. Kaashoek, R. Morris, and N. Zeldovich. Nonscalable locks are dangerous. In Proc. Linux Symposium, 2012."},{"key":"e_1_3_2_1_2_1","volume-title":"Concurrency and Computation: Practice and Experience","author":"Buhr P.","year":"2014","unstructured":"P. Buhr, D. Dice, and W. Hesselink. High-performance n-thread software solutions for mutual exclusion. In Concurrency and Computation: Practice and Experience, Early View, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989493.1989502"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145816.2145848"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823285_84"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/645604.662740"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/103727.103729"},{"key":"e_1_3_2_1_8_1","first-page":"188","volume-title":"MineBench: A Benchmark Suite for Data Mining Workloads. In IEEE International Symposium on Workload Characterization","author":"Narayanan R.","year":"2006","unstructured":"R. Narayanan, B. Azisikyilmaz, J. Zambreno, G. Memik, and A. N. Choudhary. MineBench: A Benchmark Suite for Data Mining Workloads. In IEEE International Symposium on Workload Characterization, pages 182\u2013188, 2006."},{"key":"e_1_3_2_1_9_1","unstructured":"SGI. SGI Altix UV 1000 System User\u2019s Guide. http:\/\/techpubs.sgi.com\/library\/manuals\/5000\/007-5663-003\/pdf\/007- 5663-003.pdf."}],"event":{"name":"PPoPP '15: 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming","location":"San Francisco CA USA","acronym":"PPoPP '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2688500.2688503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2688500.2688503","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2688500.2688503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:40:38Z","timestamp":1763458838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2688500.2688503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,24]]},"references-count":9,"alternative-id":["10.1145\/2688500.2688503","10.1145\/2688500"],"URL":"https:\/\/doi.org\/10.1145\/2688500.2688503","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2858788.2688503","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,1,24]]},"assertion":[{"value":"2015-01-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}