{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:00Z","timestamp":1773193560284,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CAREER-1452994"],"award-info":[{"award-number":["CAREER-1452994"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qatar Computing Research Institute"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304006","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"229-242","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Compress Objects, Not Cache Lines"],"prefix":"10.1145","author":[{"given":"Po-An","family":"Tsai","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Daniel","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/998680.1006719"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.442.0399"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830823"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665696"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.43"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375586"},{"key":"e_1_3_2_1_10_1","unstructured":"Hans-J Boehm. 2002. An artificial garbage collection benchmark . http:\/\/hboehm.info\/gc\/gc_bench.html archived at https:\/\/perma.cc\/Y4BY-7RN4 ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Guangyu Chen Mahmut Kandemir and Mary J Irwin. 2005. Exploiting frequent field values in Java objects for reducing heap memory requirements. In VEE . 10.1145\/1064979.1064990","DOI":"10.1145\/1064979.1064990"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949330"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2020989"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00051"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2821163"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.6"},{"key":"e_1_3_2_1_18_1","unstructured":"Jason Evans. 2005. jemalloc http:\/\/jemalloc.net\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Redesigning the memory hierarchy for memory-safe programming languages. Master's thesis","author":"Gan Yee Ling","unstructured":"Yee Ling Gan. 2018. Redesigning the memory hierarchy for memory-safe programming languages. Master's thesis. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_20_1","unstructured":"Sanjay Ghemawat and Paul Menage. 2005. TCMalloc: Thread-Caching Malloc http:\/\/goog-perftools.sourceforge.net\/doc\/tcmalloc.html ."},{"key":"e_1_3_2_1_21_1","volume-title":"Guava: Google Core Libraries for Java . https:\/\/github.com\/google\/guava .","year":"2004","unstructured":"Google. 2004. Guava: Google Core Libraries for Java . https:\/\/github.com\/google\/guava ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.4"},{"key":"e_1_3_2_1_23_1","unstructured":"Nangate Inc. 2008. The NanGate 45nm Open Cell Library . http:\/\/www.nangate.com\/?page_id=2325 ."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.37"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2017.12"},{"key":"e_1_3_2_1_26_1","volume-title":"JDBM: A simple transactional persistent engine for Java","author":"Kotek Jan","year":"2012","unstructured":"Jan Kotek. 2012. JDBM: A simple transactional persistent engine for Java . http:\/\/jdbm.sourceforge.net\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Barak Naveh. 2003. JGraphT . http:\/\/jgrapht.org .","DOI":"10.5465\/ambpp.2003.13792445"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830828"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195640"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446064"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056021"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540724"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370816.2370870"},{"key":"e_1_3_2_1_36_1","unstructured":"Roldan Pozo and Bruce Miller. 2004. SciMark 2.0 . https:\/\/math.nist.gov\/scimark2\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.52"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2017.7975286"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485963"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2987777"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.41"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540715"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806649"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628071.2628083"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375634.1375651"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835972"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124540"},{"key":"e_1_3_2_1_48_1","unstructured":"Standard Performance Evaluation Corporation. 2006. SPECjbb2005 (Java Server Benchmark) . https:\/\/www.spec.org\/jbb2005\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Sun Microsystems. 2006. Memory management in the Java HotSpot virtual machine . http:\/\/www.oracle.com\/technetwork\/java\/javase\/memorymanagement-whitepaper-150215.pdf ."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597652.2597655"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.452.0271"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00025"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522713"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2400682.2400689"},{"key":"e_1_3_2_1_55_1","unstructured":"Clifford Wolf. 2012. Yosys Open Synthesis Suite . http:\/\/www.clifford.at\/yosys\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640116"}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304006","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:14Z","timestamp":1750204394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304006"}},"subtitle":["An Object-Based Compressed Memory Hierarchy"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":53,"alternative-id":["10.1145\/3297858.3304006","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304006","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}