{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:41:24Z","timestamp":1725802884367},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,24]],"date-time":"2016-01-24T00:00:00Z","timestamp":1453593600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE SC0010473"],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006235","name":"Lawrence Berkely National Laboratory","doi-asserted-by":"publisher","award":["Subcontract 7106218"],"id":[{"id":"10.13039\/100006235","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,24]]},"DOI":"10.1145\/2688500.2688503","type":"proceedings-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T09:12:26Z","timestamp":1422436346000},"page":"215-226","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["High performance locks for multi-level NUMA systems"],"prefix":"10.1145","author":[{"given":"Milind","family":"Chabbi","sequence":"first","affiliation":[{"name":"Rice University, USA"}]},{"given":"Michael","family":"Fagan","sequence":"additional","affiliation":[{"name":"Rice University, USA"}]},{"given":"John","family":"Mellor-Crummey","sequence":"additional","affiliation":[{"name":"Rice University, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,1,24]]},"reference":[{"volume-title":"Proc. Linux Symposium","year":"2012","author":"Boyd-Wickizer S.","unstructured":"S. Boyd-Wickizer , M. F. Kaashoek , R. Morris , and N. Zeldovich . Nonscalable locks are dangerous . In Proc. Linux Symposium , 2012 . S. Boyd-Wickizer, M. F. Kaashoek, R. Morris, and N. Zeldovich. Nonscalable locks are dangerous. In Proc. Linux Symposium, 2012.","key":"e_1_3_2_1_1_1"},{"volume-title":"Concurrency and Computation: Practice and Experience","year":"2014","author":"Buhr P.","unstructured":"P. Buhr , D. Dice , and W. Hesselink . High-performance n-thread software solutions for mutual exclusion . In Concurrency and Computation: Practice and Experience , Early View , 2014 . P. Buhr, D. Dice, and W. Hesselink. High-performance n-thread software solutions for mutual exclusion. In Concurrency and Computation: Practice and Experience, Early View, 2014.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1989493.1989502"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2145816.2145848"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/11823285_84"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/645604.662740"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/103727.103729"},{"key":"e_1_3_2_1_8_1","first-page":"188","volume-title":"MineBench: A Benchmark Suite for Data Mining Workloads. In IEEE International Symposium on Workload Characterization","author":"Narayanan R.","year":"2006","unstructured":"R. Narayanan , B. Azisikyilmaz , J. Zambreno , G. Memik , and A. N. Choudhary . MineBench: A Benchmark Suite for Data Mining Workloads. In IEEE International Symposium on Workload Characterization , pages 182\u2013 188 , 2006 . R. Narayanan, B. Azisikyilmaz, J. Zambreno, G. Memik, and A. N. Choudhary. MineBench: A Benchmark Suite for Data Mining Workloads. In IEEE International Symposium on Workload Characterization, pages 182\u2013188, 2006."},{"unstructured":"SGI. SGI Altix UV 1000 System User\u2019s Guide. http:\/\/techpubs.sgi.com\/library\/manuals\/5000\/007-5663-003\/pdf\/007- 5663-003.pdf. SGI. SGI Altix UV 1000 System User\u2019s Guide. http:\/\/techpubs.sgi.com\/library\/manuals\/5000\/007-5663-003\/pdf\/007- 5663-003.pdf.","key":"e_1_3_2_1_9_1"}],"event":{"sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"acronym":"PPoPP '15","name":"PPoPP '15: 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming","location":"San Francisco CA USA"},"container-title":["Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2688500.2688503","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2688500.2688503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T18:33:20Z","timestamp":1693852400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2688500.2688503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,24]]},"references-count":9,"alternative-id":["10.1145\/2688500.2688503","10.1145\/2688500"],"URL":"https:\/\/doi.org\/10.1145\/2688500.2688503","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2858788.2688503","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,1,24]]},"assertion":[{"value":"2015-01-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}