{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:11:02Z","timestamp":1740132662666,"version":"3.37.3"},"reference-count":11,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/mc.2024.3384851","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T17:34:27Z","timestamp":1717436067000},"page":"122-126","source":"Crossref","is-referenced-by-count":0,"title":["The Game of Latency, Bandwidth, and Hardware Prefetching"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7381-0632","authenticated-orcid":false,"given":"Biswabandan","family":"Panda","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bombay Powai, Mumbai, India"}]}],"member":"263","reference":[{"volume-title":"Data Prefetch Support","year":"2023","key":"ref1"},{"volume-title":"The 3rd data prefetching championship","year":"2023","key":"ref2"},{"volume-title":"Hot Chips 2023: Arms Neoverse V2","year":"2023","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/micro56248.2022.00072"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00046"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614245"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446752"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/pact58117.2023.00013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480114"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00002"},{"key":"ref11","first-page":"1","article-title":"GoFetch: Breaking constant-time cryptographic implementations using data memory-dependent prefetchers","volume-title":"Proc. USENIX Secur. Symp.","author":"Chen","year":"2024"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2\/10546934\/10547076.pdf?arnumber=10547076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T17:47:37Z","timestamp":1717609657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10547076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":11,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mc.2024.3384851","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}