{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:34Z","timestamp":1750306474232,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,15]],"date-time":"2015-11-15T00:00:00Z","timestamp":1447545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,15]]},"DOI":"10.1145\/2831129.2831133","type":"proceedings-article","created":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T16:29:04Z","timestamp":1447086544000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Overtime"],"prefix":"10.1145","author":[{"given":"Ryan E.","family":"Grant","sequence":"first","affiliation":[{"name":"Sandia National Laboratories, Center for Computing Research, Albuquerque, NM"}]},{"given":"Kevin T.","family":"Pedretti","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Center for Computing Research, Albuquerque, NM"}]},{"given":"Ann","family":"Gentile","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Center for Computing Research, Albuquerque, NM"}]}],"member":"320","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Technical report","author":"Network The Gemini","year":"2010","unstructured":"The Gemini Network . Technical report , Cray Inc ., Aug. 2010 . The Gemini Network. Technical report, Cray Inc., Aug. 2010."},{"key":"e_1_3_2_1_2_1","unstructured":"Blue waters system summary May 2014. https:\/\/bluewaters.ncsa.illinois.edu\/hardware-summary.  Blue waters system summary May 2014. https:\/\/bluewaters.ncsa.illinois.edu\/hardware-summary."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503247"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/950788.951206"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1169223.1169617"},{"key":"e_1_3_2_1_6_1","first-page":"19","volume-title":"Proceedings of the 2008 ACM\/IEEE conference on Supercomputing","author":"Ferreira K. B.","unstructured":"K. B. Ferreira , P. Bridges , and R. Brightwell . Characterizing application sensitivity to OS interference using kernel-level noise injection . In Proceedings of the 2008 ACM\/IEEE conference on Supercomputing , page 19 . IEEE Press, 2008. K. B. Ferreira, P. Bridges, and R. Brightwell. Characterizing application sensitivity to OS interference using kernel-level noise injection. In Proceedings of the 2008 ACM\/IEEE conference on Supercomputing, page 19. IEEE Press, 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2010.12"},{"key":"e_1_3_2_1_8_1","volume-title":"Using the Cray Gemini performance counters","author":"Pedretti K.","year":"2013","unstructured":"K. Pedretti , C. Vaughan , R. Barrett , K. Devine , and K. S. Hemmert . Using the Cray Gemini performance counters . In Proc Cray User Group (CUG) , 2013 . K. Pedretti, C. Vaughan, R. Barrett, K. Devine, and K. S. Hemmert. Using the Cray Gemini performance counters. In Proc Cray User Group (CUG), 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1048935.1050204"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2005.1526010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCMP-UGC.2009.72"}],"event":{"name":"SC15: The International Conference for High Performance Computing, Networking, Storage and Analysis","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"SC15"},"container-title":["Proceedings of the 3rd Workshop on Exascale MPI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831129.2831133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2831129.2831133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831129.2831133"}},"subtitle":["a tool for analyzing performance variation due to network interference"],"short-title":[],"issued":{"date-parts":[[2015,11,15]]},"references-count":11,"alternative-id":["10.1145\/2831129.2831133","10.1145\/2831129"],"URL":"https:\/\/doi.org\/10.1145\/2831129.2831133","relation":{},"subject":[],"published":{"date-parts":[[2015,11,15]]},"assertion":[{"value":"2015-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}