{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:38:23Z","timestamp":1767854303433,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1145\/3240302.3240320","type":"proceedings-article","created":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T13:33:56Z","timestamp":1546608836000},"page":"19-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A comprehensive memory analysis of data intensive workloads on server class architecture"],"prefix":"10.1145","author":[{"given":"Hosein Mohammadi","family":"Makrani","sequence":"first","affiliation":[{"name":"George Mason University"}]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Sai Manoj Pudukotai","family":"Dinakarra","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2018,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. The Apache Software Foundation Available at: https:\/\/hadoop.apache.org\/.  {n. d.}. The Apache Software Foundation Available at: https:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. Available at: https:\/\/software.intel.com\/en-us\/articles\/intel-performance-counter-monito.  {n. d.}. Available at: https:\/\/software.intel.com\/en-us\/articles\/intel-performance-counter-monito."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2013100106"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.567"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/279358.279363"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/279358.279363"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485943"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2015.12"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.143"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2015.32"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691693"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.2150982"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2010.5452747"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694730.2694732"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-016-0053-0"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2013.6704671"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2014.6983058"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2014.6983036"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2014.39"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2017.8167763"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2017.8167751"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Dependability (DEPEND). 51--57","author":"Makrani Hosein Mohammadi","year":"2014","unstructured":"Hosein Mohammadi Makrani , Amir Mahdi Hosseini Monazzah , Hamed Farbeh , and Seyed Ghassem Miremadi . 2014 . Evaluation of software-based fault-tolerant techniques on embedded OS\u00e2\u0102&Zacute;s components . In International Conference on Dependability (DEPEND). 51--57 . Hosein Mohammadi Makrani, Amir Mahdi Hosseini Monazzah, Hamed Farbeh, and Seyed Ghassem Miremadi. 2014. Evaluation of software-based fault-tolerant techniques on embedded OS\u00e2\u0102&Zacute;s components. In International Conference on Dependability (DEPEND). 51--57."},{"key":"e_1_3_2_1_24_1","volume-title":"Main-Memory Requirements of Big Data Applications on Commodity Server Platform. In 18th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). IEEE.","author":"Makrani Hosein Mohammadi","year":"2018","unstructured":"Hosein Mohammadi Makrani , Setareh Rafatirad , Amir Houmansadr , and Houman Homayoun . 2018 . Main-Memory Requirements of Big Data Applications on Commodity Server Platform. In 18th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). IEEE. Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, and Houman Homayoun. 2018. Main-Memory Requirements of Big Data Applications on Commodity Server Platform. In 18th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). IEEE."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2018.8445131"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2017.8323591"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2016.7482087"},{"key":"e_1_3_2_1_28_1","volume-title":"Design Space Exploration for Hardware Acceleration of Machine Learning Applications in MapReduce. In The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM).","author":"Neshatpour Katayoun","year":"2018","unstructured":"Katayoun Neshatpour , Hosein Mohammadi Makrani , Avesta Sasan , Hassan Ghasemzadeh , Setareh Rafatirad , and Houman Homayoun . 2018 . Design Space Exploration for Hardware Acceleration of Machine Learning Applications in MapReduce. In The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM). Katayoun Neshatpour, Hosein Mohammadi Makrani, Avesta Sasan, Hassan Ghasemzadeh, Setareh Rafatirad, and Houman Homayoun. 2018. Design Space Exploration for Hardware Acceleration of Machine Learning Applications in MapReduce. In The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229631.3229639"},{"key":"e_1_3_2_1_30_1","first-page":"293","article-title":"Making Sense of Performance in Data Analytics Frameworks","volume":"15","author":"Ousterhout Kay","year":"2015","unstructured":"Kay Ousterhout , Ryan Rasti , Sylvia Ratnasamy , Scott Shenker , Byung-Gon Chun , and V ICSI. 2015 . Making Sense of Performance in Data Analytics Frameworks .. In NSDI , Vol. 15. 293 -- 307 . Kay Ousterhout, Ryan Rasti, Sylvia Ratnasamy, Scott Shenker, Byung-Gon Chun, and V ICSI. 2015. Making Sense of Performance in Data Analytics Frameworks.. In NSDI, Vol. 15. 293--307.","journal-title":"NSDI"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13021-7_7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2647322"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962091"},{"key":"e_1_3_2_1_34_1","volume-title":"Setareh Rafatirad, and Houman Homayoun.","author":"Sayadi Hossein","year":"2018","unstructured":"Hossein Sayadi , H.M Makrani , Onkar Randive , Sai Manoj P D , Setareh Rafatirad, and Houman Homayoun. 2018 . Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom- 18) (2018). Hossein Sayadi, H.M Makrani, Onkar Randive, Sai Manoj P D, Setareh Rafatirad, and Houman Homayoun. 2018. Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (2018)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196047"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557175"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835958"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691707"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2015.2440413"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2014.6844459"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2--2.","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy McCauley , Michael J Franklin , Scott Shenker , and Ion Stoica . 2012 . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2--2. Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2--2."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.05.169"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.2"}],"event":{"name":"MEMSYS '18: The International Symposium on Memory Systems","location":"Alexandria Virginia USA","acronym":"MEMSYS '18"},"container-title":["Proceedings of the International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240302.3240320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240302.3240320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:42Z","timestamp":1750207422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240302.3240320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":43,"alternative-id":["10.1145\/3240302.3240320","10.1145\/3240302"],"URL":"https:\/\/doi.org\/10.1145\/3240302.3240320","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]},"assertion":[{"value":"2018-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}