{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905280","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Effect of TLB on system performance"],"prefix":"10.1145","author":[{"given":"Manisha","family":"Agarwal","sequence":"first","affiliation":[{"name":"Banasthali University, Raj."}]},{"given":"Manisha","family":"Jailia","sequence":"additional","affiliation":[{"name":"Banasthali University, Raj."}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kev Kitchens \"Predicting and Prefetching TLB Entries from Irregular Access Streams\" December 8 2013  Kev Kitchens \"Predicting and Prefetching TLB Entries from Irregular Access Streams\" December 8 2013"},{"volume-title":"National Conference on \"Information & Communication Technology\" organized by Sir Padampat Singhania University, Udaipur dated 5-6 March,2010","author":"Manisha Agarwal A","key":"e_1_3_2_1_2_1","unstructured":"Manisha Agarwal , et al. \" A Survey on Translation Look aside Buffer\" in National Conference on \"Information & Communication Technology\" organized by Sir Padampat Singhania University, Udaipur dated 5-6 March,2010 . Manisha Agarwal, et al. \"A Survey on Translation Look aside Buffer\" in National Conference on \"Information & Communication Technology\" organized by Sir Padampat Singhania University, Udaipur dated 5-6 March,2010."},{"key":"e_1_3_2_1_3_1","first-page":"503","volume-title":"USA: Morgan Kaufmann Publishers.","author":"David A.","year":"1803","unstructured":"David A. Patterson ; John L. Hennessy.\" Computer Organization and Design. Hardware\/Software interface\". 4 th edition. Burlington , MA 0 1803 , USA: Morgan Kaufmann Publishers. p. 503 . ISBN 978-0-12-374493-7., 2009. David A. Patterson; John L. Hennessy.\" Computer Organization and Design. Hardware\/Software interface\". 4th edition. Burlington, MA 01803, USA: Morgan Kaufmann Publishers. p. 503. ISBN 978-0-12-374493-7., 2009.","edition":"4"},{"key":"e_1_3_2_1_4_1","volume-title":"Texas","author":"Barr TLB","year":"2010","unstructured":"TW Barr ,\"Exploiting Address Space Contiguity to Accelerate TLB Miss Handling \" , RICE UNIVERSITY Houston , Texas , April , 2010 TW Barr,\"Exploiting Address Space Contiguity to Accelerate TLB Miss Handling \", RICE UNIVERSITY Houston, Texas, April, 2010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2008.4510742"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/106972.106985"},{"key":"e_1_3_2_1_7_1","unstructured":"\"Intel 64 and IA-32 Architectures Software Developer's Manuals\"Intel 2009  \"Intel 64 and IA-32 Architectures Software Developer's Manuals\"Intel 2009"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/195473.195521"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the USENIX winter Technical Conference","author":"Chen B.","year":"1994","unstructured":"Chen , B. Memory Behavior of an X11 Window System , In Proc. of the USENIX winter Technical Conference , 1994 Chen, B. Memory Behavior of an X11 Window System, In Proc. of the USENIX winter Technical Conference, 1994"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/191995.192070"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/183018.183056"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168629"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165127"},{"key":"e_1_3_2_1_14_1","volume-title":"Performance of a Software MPEG Video Decoder","author":"Patel K.","year":"1992","unstructured":"Patel , K. , Smith , B. C. and Rowe , L. A. , Performance of a Software MPEG Video Decoder , University of California , Berkeley , 1992 Patel, K., Smith, B. C. and Rowe, L. A., Performance of a Software MPEG Video Decoder, University of California, Berkeley, 1992"},{"key":"e_1_3_2_1_15_1","volume-title":"Intel486 DX Microprocessor Data Book","author":"Intel","year":"1992","unstructured":"Intel , Intel486 DX Microprocessor Data Book , 1992 Intel, Intel486 DX Microprocessor Data Book, 1992"},{"key":"e_1_3_2_1_16_1","volume-title":"Monster: A Tool for Analyzing the Interaction Between Operating Systems and Computer Architectures","author":"Nagle D.","year":"1992","unstructured":"Nagle , D. , Uhlig , R. and Mudge , T . Monster: A Tool for Analyzing the Interaction Between Operating Systems and Computer Architectures . The University of Michigan . CSE-TR-147-92. 1992 Nagle, D., Uhlig, R. and Mudge, T. Monster: A Tool for Analyzing the Interaction Between Operating Systems and Computer Architectures. The University of Michigan. CSE-TR-147-92. 1992"},{"key":"e_1_3_2_1_17_1","volume-title":"Alpha Architecture Reference Manual","author":"Sites R.","year":"1992","unstructured":"Sites , R. , Alpha Architecture Reference Manual , Digital Press , 1992 Sites, R., Alpha Architecture Reference Manual, Digital Press, 1992"},{"key":"e_1_3_2_1_18_1","volume-title":"Tracing with pixie","author":"Smith M.D.","year":"1991","unstructured":"Smith , M.D. Tracing with pixie . Stanford University , Stanford, CA . 1991 Smith, M.D. Tracing with pixie. Stanford University, Stanford, CA. 1991"},{"key":"e_1_3_2_1_19_1","first-page":"423","volume-title":"Computer Architecture: A Quantitative Approach","author":"Hennessy J.","year":"1990","unstructured":"Hennessy , J. , Patterson , D. , Computer Architecture: A Quantitative Approach , p 423 -- 424 , Morgan Kaufmann Publishers , INC. , 1990 Hennessy, J., Patterson, D., Computer Architecture: A Quantitative Approach, p 423--424, Morgan Kaufmann Publishers, INC., 1990"},{"key":"e_1_3_2_1_20_1","unstructured":"Malan G. etal DOS as a Mach 3.0 Application  Malan G. et al. DOS as a Mach 3.0 Application"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ousterhout J. Why aren't operating systems getting faster as fast as hardware. WRL Technical Note (TN-11): 1989  Ousterhout J. Why aren't operating systems getting faster as fast as hardware. WRL Technical Note (TN-11): 1989","DOI":"10.1145\/65762.65765"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.2242"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.467697"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":23,"alternative-id":["10.1145\/2905055.2905280","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905280","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}