{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:50:58Z","timestamp":1773481858295,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,12]],"date-time":"2022-06-12T00:00:00Z","timestamp":1654992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,12]]},"DOI":"10.1145\/3533737.3535089","type":"proceedings-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T13:12:09Z","timestamp":1655125929000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["To use or not to use the SIMD gather instruction?"],"prefix":"10.1145","author":[{"given":"Dirk","family":"Habich","sequence":"first","affiliation":[{"name":"TU Dresden, DE"}]},{"given":"Johannes","family":"Pietrzyk","sequence":"additional","affiliation":[{"name":"TU Dresden, DE"}]},{"given":"Alexander","family":"Krause","sequence":"additional","affiliation":[{"name":"TU Dresden, DE"}]},{"given":"Juliana","family":"Hildebrandt","sequence":"additional","affiliation":[{"name":"TU Dresden, DE"}]},{"given":"Wolfgang","family":"Lehner","sequence":"additional","affiliation":[{"name":"TU Dresden, DE"}]}],"member":"320","published-online":{"date-parts":[[2022,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000024"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687625"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142548"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732219.2732227"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2313874"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989328"},{"key":"e_1_3_2_1_7_1","volume-title":"Second Biennial Conference on Innovative Data Systems Research, CIDR 2005, Asilomar, CA, USA, January 4-7, 2005, Online Proceedings. CIDR, 225\u2013237","author":"Boncz A.","year":"2005","unstructured":"Peter\u00a0 A. Boncz , Marcin Zukowski , and Niels Nes . 2005 . MonetDB\/X100: Hyper-Pipelining Query Execution . In Second Biennial Conference on Innovative Data Systems Research, CIDR 2005, Asilomar, CA, USA, January 4-7, 2005, Online Proceedings. CIDR, 225\u2013237 . http:\/\/cidrdb.org\/cidr2005\/papers\/P19.pdf Peter\u00a0A. Boncz, Marcin Zukowski, and Niels Nes. 2005. MonetDB\/X100: Hyper-Pipelining Query Execution. In Second Biennial Conference on Innovative Data Systems Research, CIDR 2005, Asilomar, CA, USA, January 4-7, 2005, Online Proceedings. CIDR, 225\u2013237. http:\/\/cidrdb.org\/cidr2005\/papers\/P19.pdf"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454171"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407833"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2643033"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747642"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01746-9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/3275366.3284966"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2203"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3151113.3151114"},{"key":"e_1_3_2_1_16_1","volume-title":"To share or not to share vector registers?The VLDB Journal","author":"Pietrzyk Johannes","year":"2022","unstructured":"Johannes Pietrzyk , Alexander Krause , Dirk Habich , and Wolfgang Lehner . 2022. To share or not to share vector registers?The VLDB Journal ( 2022 ), 1\u201322. https:\/\/doi.org\/10.1007\/s00778-022-00744-2 Johannes Pietrzyk, Alexander Krause, Dirk Habich, and Wolfgang Lehner. 2022. To share or not to share vector registers?The VLDB Journal (2022), 1\u201322. https:\/\/doi.org\/10.1007\/s00778-022-00744-2"},{"key":"e_1_3_2_1_17_1","volume-title":"Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW","author":"Pietrzyk Johannes","year":"2019","unstructured":"Johannes Pietrzyk , Annett Ungeth\u00fcm , Dirk Habich , and Wolfgang Lehner . 2019. Fighting the Duplicates in Hashing: Conflict Detection-aware Vectorization of Linear Probing . In Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW 2019 ), 18. Fachtagung des GI-Fachbereichs,,Datenbanken und Informationssysteme\u201d (DBIS), 4.-8. M\u00e4rz 2019, Rostock, Germany, Proceedings(LNI, Vol.\u00a0P-289). Gesellschaft f\u00fcr Informatik, Bonn , 35\u201353. https:\/\/doi.org\/10.18420\/btw2019-04 Johannes Pietrzyk, Annett Ungeth\u00fcm, Dirk Habich, and Wolfgang Lehner. 2019. Fighting the Duplicates in Hashing: Conflict Detection-aware Vectorization of Linear Probing. In Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW 2019), 18. Fachtagung des GI-Fachbereichs,,Datenbanken und Informationssysteme\u201d (DBIS), 4.-8. M\u00e4rz 2019, Rostock, Germany, Proceedings(LNI, Vol.\u00a0P-289). Gesellschaft f\u00fcr Informatik, Bonn, 35\u201353. https:\/\/doi.org\/10.18420\/btw2019-04"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747645"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610522"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619228.2619234"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3329785.3329928"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-020-00621-w"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807207"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.25"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687671"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564709"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1457150.1457160"}],"event":{"name":"SIGMOD\/PODS '22: International Conference on Management of Data","location":"Philadelphia PA USA","acronym":"SIGMOD\/PODS '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Data Management on New Hardware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533737.3535089","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533737.3535089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533737.3535089"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,12]]},"references-count":27,"alternative-id":["10.1145\/3533737.3535089","10.1145\/3533737"],"URL":"https:\/\/doi.org\/10.1145\/3533737.3535089","relation":{},"subject":[],"published":{"date-parts":[[2022,6,12]]},"assertion":[{"value":"2022-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}