{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T15:00:44Z","timestamp":1776956444262,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3676641.3716258","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:47:32Z","timestamp":1743094052000},"page":"482-497","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Hardware Sentinel: Protecting Software Applications from Hardware Silent Data Corruptions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6782-2612","authenticated-orcid":false,"given":"Rhea","family":"Dutta","sequence":"first","affiliation":[{"name":"Meta Platforms, Inc., Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1163-5568","authenticated-orcid":false,"given":"Harish Dattatraya","family":"Dixit","sequence":"additional","affiliation":[{"name":"Meta Platforms, Inc., Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8010-3635","authenticated-orcid":false,"given":"Rik","family":"Van Riel","sequence":"additional","affiliation":[{"name":"Meta Platforms, Inc., Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1875-9043","authenticated-orcid":false,"given":"Gautham","family":"Vunnam","sequence":"additional","affiliation":[{"name":"Meta Platforms, Inc., Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4581-8371","authenticated-orcid":false,"given":"Sriram","family":"Sankar","sequence":"additional","affiliation":[{"name":"Meta Platforms, Inc., Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Interrupt Descriptor Table - IDT - OSDev Wiki. https:\/\/wiki.osdev.org\/Interrupt_Descriptor_Table."},{"key":"e_1_3_2_1_2_1","unstructured":"PCISIG specifications. https:\/\/pcisig.com\/specifications. Accessed: 2024-09-30."},{"key":"e_1_3_2_1_3_1","unstructured":"System Calls- OSDev Wiki. https:\/\/wiki.osdev.org\/SystemCalls. Accessed: 2024-09-30."},{"key":"e_1_3_2_1_4_1","volume-title":"Jul","author":"Standard Specification JEDEC","year":"2021","unstructured":"DDR4 JEDEC Standard Specification. https:\/\/www.jedec.org, Jul 2021."},{"key":"e_1_3_2_1_5_1","volume-title":"June","author":"BMC.","year":"2023","unstructured":"OpenBMC. https:\/\/www.openbmc.org\/, June 2023."},{"key":"e_1_3_2_1_6_1","volume-title":"Jan","author":"Menace Computing's Hidden","year":"2024","unstructured":"Computing's Hidden Menace: The OCP Takes Action Against Silent Data Corruption (SDC). https:\/\/www.opencompute.org\/blog\/computings-hidden-menace-the-ocp-takes-action-against-silentdata-corruption-sdc, Jan 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"Jun","author":"Project Open Compute","year":"2024","unstructured":"Open Compute Project. https:\/\/www.opencompute.org\/, Jun 2024."},{"key":"e_1_3_2_1_8_1","volume-title":"Aug","author":"Caroline Trippel","year":"2022","unstructured":"Caroline Trippel on Aug 15. Silent data corruption at scale, Aug 2022."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536231"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00052"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614304"},{"key":"e_1_3_2_1_12_1","volume-title":"A scalable, commodity data center network architecture. ACM SIGCOMM computer communication review, 38(4):63--74","author":"Al-Fares Mohammad","year":"2008","unstructured":"Mohammad Al-Fares, Alexander Loukissas, and Amin Vahdat. A scalable, commodity data center network architecture. ACM SIGCOMM computer communication review, 38(4):63--74, 2008."},{"key":"e_1_3_2_1_13_1","unstructured":"AMD. AMD Documentation Hub."},{"key":"e_1_3_2_1_14_1","volume-title":"An analysis of data corruption in the storage stack. ACM Trans. Storage, 4(3), nov","author":"Bairavasundaram Lakshmi N.","year":"2008","unstructured":"Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Garth R. Goodson, and Bianca Schroeder. An analysis of data corruption in the storage stack. ACM Trans. Storage, 4(3), nov 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2003.1196112"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749253"},{"key":"e_1_3_2_1_18_1","volume-title":"Site reliability engineering: How Google runs production systems. \" O'Reilly Media","author":"Beyer Betsy","year":"2016","unstructured":"Betsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy. Site reliability engineering: How Google runs production systems. \" O'Reilly Media, Inc.\", 2016."},{"key":"e_1_3_2_1_19_1","volume-title":"The gem5 simulator. ACM SIGARCH computer architecture news, 39(2):1--7","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven K Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek R Hower, Tushar Krishna, Somayeh Sardashti, et al. The gem5 simulator. ACM SIGARCH computer architecture news, 39(2):1--7, 2011."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989438"},{"key":"e_1_3_2_1_21_1","volume-title":"Bovet and Marco Cesati. Understanding the linux kernel","author":"Daniel","year":"2005","unstructured":"Daniel P. Bovet and Marco Cesati. Understanding the linux kernel, third edition. 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2904441"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491245"},{"key":"e_1_3_2_1_24_1","volume-title":"Intel sgx explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. Intel sgx explained. Cryptology ePrint Archive, 2016."},{"key":"e_1_3_2_1_25_1","volume-title":"Nov","author":"Coutinho Brian","year":"2022","unstructured":"Brian Coutinho. Dynolog: Open source system observability, Nov 2022."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3314035"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3375793"},{"key":"e_1_3_2_1_28_1","volume-title":"The 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS 2009)","author":"Dean Jeffrey","year":"2009","unstructured":"Jeffrey Dean. Large-scale distributed systems at google: Current systems and future directions. In The 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS 2009) Tutorial, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00026"},{"key":"e_1_3_2_1_30_1","volume-title":"Detecting silent data corruptions in the wild. arXiv preprint arXiv:2203.08989","author":"Dixit Harish Dattatraya","year":"2022","unstructured":"Harish Dattatraya Dixit, Laura Boyle, Gautham Vunnam, Sneha Pendharkar, Matt Beadon, and Sriram Sankar. Detecting silent data corruptions in the wild. arXiv preprint arXiv:2203.08989, 2022."},{"key":"e_1_3_2_1_31_1","volume-title":"Silent data corruptions at scale. arXiv preprint arXiv:2102.11245","author":"Dixit Harish Dattatraya","year":"2021","unstructured":"Harish Dattatraya Dixit, Sneha Pendharkar, Matt Beadon, Chris Mason, Tejasvi Chakravarthy, Bharath Muthiah, and Sriram Sankar. Silent data corruptions at scale. arXiv preprint arXiv:2102.11245, 2021."},{"key":"e_1_3_2_1_32_1","volume-title":"Rocksdb: Evolution of development priorities in a key-value store serving large-scale applications. ACM Trans. Storage, 17(4), oct","author":"Dong Siying","year":"2021","unstructured":"Siying Dong, Andrew Kryczka, Yanqin Jin, and Michael Stumm. Rocksdb: Evolution of development priorities in a key-value store serving large-scale applications. ACM Trans. Storage, 17(4), oct 2021."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889222"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2017.47"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.25"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2388996.2389102"},{"key":"e_1_3_2_1_37_1","volume-title":"Dynamic, robust capacity management for multi-tier data centers. ACM Transactions on Computer Systems (TOCS), 30(4):1--26","author":"Gandhi Anshul","year":"2012","unstructured":"Anshul Gandhi, Mor Harchol-Balter, Ram Raghunathan, and Michael A Kozuch. Autoscale: Dynamic, robust capacity management for multi-tier data centers. ACM Transactions on Computer Systems (TOCS), 30(4):1--26, 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_1_39_1","first-page":"125","volume-title":"End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach. In 2010 IEEE 16th Pacific rim international symposium on dependable computing","author":"Ghosh Rahul","year":"2010","unstructured":"Rahul Ghosh, Kishor S Trivedi, Vijay K Naik, and Dong Seong Kim. End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach. In 2010 IEEE 16th Pacific rim international symposium on dependable computing, pages 125--132. IEEE, 2010."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2019.1800045"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/DSN.2003.1209956","volume-title":"2003 International Conference on Dependable Systems and Networks, 2003. Proceedings.","author":"Gu Weining","year":"2003","unstructured":"Weining Gu, Zbigniew Kalbarczyk, Ravishankar K Iyer, and Zhenyu Yang. Characterization of linux kernel behavior under errors. In 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pages 459--459. IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263960"},{"key":"e_1_3_2_1_43_1","volume-title":"Estimating silent data corruption rates using a two-level model. arXiv preprint arXiv:2005.01445","author":"Sastry Hari Siva Kumar","year":"2020","unstructured":"Siva Kumar Sastry Hari, Paolo Rech, Timothy Tsai, Mark Stephenson, Arslan Zulfiqar, Michael Sullivan, Philip Shirvani, Paul Racunas, Joel Emer, and StephenWKeckler. Estimating silent data corruption rates using a two-level model. arXiv preprint arXiv:2005.01445, 2020."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589105"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/3571885.3571907"},{"key":"e_1_3_2_1_47_1","volume-title":"Pearson Education","author":"Humble Jez","year":"2010","unstructured":"Jez Humble and David Farley. Continuous delivery: reliable software releases through build, test, and deployment automation. Pearson Education, 2010."},{"key":"e_1_3_2_1_48_1","unstructured":"Intel. Intel\u00ae 64 and ia-32 architectures software developer manuals."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC51656.2023.00026"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.862209"},{"key":"e_1_3_2_1_51_1","unstructured":"Nikos Karystinos Odysseas Chatzopoulos George-Marios Fragkoulis George Papadimitriou Dimitris Gizopoulos and Sudhanva Gurumurthi. Harpocrates: Breaking the silence of cpu faults through hardware-in-the-loop program generation."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476184"},{"key":"e_1_3_2_1_53_1","first-page":"1","article-title":"Cost-and energy-aware load distribution across data centers","author":"Le Kien","year":"2009","unstructured":"Kien Le, Ricardo Bianchini, Margaret Martonosi, and Thu D Nguyen. Cost-and energy-aware load distribution across data centers. Proceedings of HotPower, 1, 2009.","journal-title":"Proceedings of HotPower"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2170444.2170448"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC50671.2022.00076"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020972"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00015"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S50200.2020.00016"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS48698.2020.9080918"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620666.3651349"},{"key":"e_1_3_2_1_61_1","unstructured":"Thiago Jose Macieira. Open data center diagnostic project. Intel."},{"issue":"1","key":"e_1_3_2_1_62_1","article-title":"Hyper-threading technology architecture and microarchitecture","volume":"6","author":"Marr Deborah T","year":"2002","unstructured":"Deborah T Marr, Frank Binns, David L Hill, Glenn Hinton, David A Koufaty, J Alan Miller, and Michael Upton. Hyper-threading technology architecture and microarchitecture. Intel Technology Journal, 6(1), 2002.","journal-title":"Intel Technology Journal"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278566"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.855685"},{"key":"e_1_3_2_1_65_1","first-page":"1","volume-title":"Eighth workshop on computer architecture evaluation using commercial workloads","author":"Moore Justin","year":"2005","unstructured":"Justin Moore, Jeff Chase, Keith Farkas, and Parthasarathy Ranganathan. Data center workload monitoring, analysis, and emulation. In Eighth workshop on computer architecture evaluation using commercial workloads, pages 1--8, 2005."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.37"},{"key":"e_1_3_2_1_67_1","volume-title":"Morgan Kaufmann","author":"Mukherjee Shubu","year":"2011","unstructured":"Shubu Mukherjee. Architecture design for soft errors. Morgan Kaufmann, 2011."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00084"},{"key":"e_1_3_2_1_69_1","volume-title":"Highly efficient self-checking matrix multiplication on tiled amx accelerators. ACM Trans. Archit. Code Optim., nov","author":"Mummidi Chandra Sekhar","year":"2023","unstructured":"Chandra Sekhar Mummidi, Victor C. Ferreira, Sudarshan Srinivasan, and Sandip Kundu. Highly efficient self-checking matrix multiplication on tiled amx accelerators. ACM Trans. Archit. Code Optim., nov 2023. Just Accepted."},{"key":"e_1_3_2_1_70_1","volume-title":"The netflix tech blog: Prepapring the netflix api for deployment","author":"Narayanan S","year":"2013","unstructured":"S Narayanan. The netflix tech blog: Prepapring the netflix api for deployment, 2013."},{"key":"e_1_3_2_1_71_1","volume-title":"Scale in distributed systems. 01","author":"Neuman Cliord","year":"2000","unstructured":"Cliord Neuman. Scale in distributed systems. 01 2000."},{"key":"e_1_3_2_1_72_1","first-page":"385","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI","author":"Nishtala Rajesh","year":"2013","unstructured":"Rajesh Nishtala, Hans Fugal, Steven Grimm, Marc Kwiatkowski, Herman Lee, Harry C Li, Ryan McElroy, Mike Paleczny, Daniel Peek, Paul Saab, et al. Scaling memcache at facebook. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI, pages 385--398, 2013."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3285094"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS59296.2023.10224870"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2008.02.003"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476147"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2363152"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3195997"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787472"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889223"},{"key":"e_1_3_2_1_81_1","volume-title":"Silifuzz: Fuzzing cpus by proxy","author":"Serebryany Kostya","year":"2021","unstructured":"Kostya Serebryany, Maxim Lifantsev, Konstantin Shtoyk, Doug Kwan, and Peter Hochschild. Silifuzz: Fuzzing cpus by proxy, 2021."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00196"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666479"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS56346.2023.10139970"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.004"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694348"},{"key":"e_1_3_2_1_87_1","volume-title":"Emerging fault modes: Challenges and research opportunities","author":"Sudhanva Gurumurthi","year":"2023","unstructured":"Gurumurthi Sudhanva, Sridharan Vilas, and Gurumurthy Sankar. Emerging fault modes: Challenges and research opportunities. 2023."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00067"},{"key":"e_1_3_2_1_89_1","volume-title":"Tanenbaum and Maarten Van Steen. Distributed Systems: Principles and Paradigms","author":"Andrew","year":"2001","unstructured":"Andrew S. Tanenbaum and Maarten Van Steen. Distributed Systems: Principles and Paradigms. Prentice Hall PTR, USA, 1st edition, 2001.","edition":"1"},{"key":"e_1_3_2_1_90_1","first-page":"787","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Tang Chunqiang","year":"2020","unstructured":"Chunqiang Tang, Kenny Yu, Kaushik Veeraraghavan, Jonathan Kaldor, Scott Michelson, Thawan Kooburat, Aravind Anbudurai, Matthew Clark, Kabir Gogia, Long Cheng, et al. Twine: A unified cluster management system for shared infrastructure. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pages 787--803, 2020."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522318"},{"key":"e_1_3_2_1_92_1","volume-title":"et al. Gemini: A family of highly capable multimodal models","author":"Team Gemini","year":"2024","unstructured":"Gemini Team, Rohan Anil, Sebastian Borgeaud, et al. Gemini: A family of highly capable multimodal models, 2024."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807278"},{"key":"e_1_3_2_1_94_1","first-page":"2","volume-title":"Invited talk at the 2010Workshop on Power Aware Computing and Systems","author":"Vaid Kushagra","year":"2010","unstructured":"Kushagra Vaid. Datacenter power efficiency: Separating fact from fiction. In Invited talk at the 2010Workshop on Power Aware Computing and Systems, volume 1, page 2, 2010."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741964"},{"key":"e_1_3_2_1_96_1","volume-title":"June","author":"Saranyan","year":"2024","unstructured":"Saranyan A. Vigraham and Benjamin Leonhardi. Maintaining largescale ai capacity at meta, June 2024."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189740.1189747"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4919-2"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.26"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613149"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1638(199809\/10)14:5<331::AID-QRE183>3.0.CO;2-L"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274820"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788602"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3716258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676641.3716258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:09:17Z","timestamp":1755774557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3716258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":104,"alternative-id":["10.1145\/3676641.3716258","10.1145\/3676641"],"URL":"https:\/\/doi.org\/10.1145\/3676641.3716258","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}