{"id":"https://openalex.org/W4238569137","doi":"https://doi.org/10.1145/1640089.1640117","title":"NUMA-aware memory manager with dominant-thread-based copying GC","display_name":"NUMA-aware memory manager with dominant-thread-based copying GC","publication_year":2009,"publication_date":"2009-10-25","ids":{"openalex":"https://openalex.org/W4238569137","doi":"https://doi.org/10.1145/1640089.1640117"},"language":"en","primary_location":{"id":"doi:10.1145/1640089.1640117","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1640089.1640117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM SIGPLAN conference on Object oriented programming systems languages and applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026231930","display_name":"Takeshi Ogasawara","orcid":"https://orcid.org/0000-0002-4021-5239"},"institutions":[{"id":"https://openalex.org/I4210145865","display_name":"IBM Research - Tokyo","ror":"https://ror.org/04915qk43","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210145865"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takeshi Ogasawara","raw_affiliation_strings":["IBM Research - Tokyo, Yamato, Japan"],"affiliations":[{"raw_affiliation_string":"IBM Research - Tokyo, Yamato, Japan","institution_ids":["https://openalex.org/I4210145865"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5026231930"],"corresponding_institution_ids":["https://openalex.org/I4210145865"],"apc_list":null,"apc_paid":null,"fwci":2.1106,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.88643315,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"377","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.874774694442749},{"id":"https://openalex.org/keywords/garbage-collection","display_name":"Garbage collection","score":0.8338377475738525},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.6339505910873413},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.6218903660774231},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5804593563079834},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5602192878723145},{"id":"https://openalex.org/keywords/garbage","display_name":"Garbage","score":0.5279290676116943},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.5073122382164001},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.48358577489852905},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.482243150472641},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4573180079460144},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.42370370030403137},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15375754237174988},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.10128149390220642}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.874774694442749},{"id":"https://openalex.org/C105122174","wikidata":"https://www.wikidata.org/wiki/Q322202","display_name":"Garbage collection","level":3,"score":0.8338377475738525},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.6339505910873413},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.6218903660774231},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5804593563079834},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5602192878723145},{"id":"https://openalex.org/C75403996","wikidata":"https://www.wikidata.org/wiki/Q5521979","display_name":"Garbage","level":2,"score":0.5279290676116943},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5073122382164001},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.48358577489852905},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.482243150472641},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4573180079460144},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.42370370030403137},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15375754237174988},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.10128149390220642},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1640089.1640117","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1640089.1640117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM SIGPLAN conference on Object oriented programming systems languages and applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1981134012","https://openalex.org/W2013678664","https://openalex.org/W2028080565","https://openalex.org/W2054805277","https://openalex.org/W2064238114","https://openalex.org/W2073764240","https://openalex.org/W2076264849","https://openalex.org/W2079610913","https://openalex.org/W2079777558","https://openalex.org/W2081597309","https://openalex.org/W2094449661","https://openalex.org/W2094755621","https://openalex.org/W2095594115","https://openalex.org/W2103580083","https://openalex.org/W2115617161","https://openalex.org/W2131040110","https://openalex.org/W2135964711","https://openalex.org/W2158738500","https://openalex.org/W4231060654"],"related_works":["https://openalex.org/W2245694847","https://openalex.org/W4381304378","https://openalex.org/W4384948881","https://openalex.org/W2132258996","https://openalex.org/W2182829270","https://openalex.org/W2592247214","https://openalex.org/W2104098106","https://openalex.org/W2165063050","https://openalex.org/W3046276722","https://openalex.org/W4200058186"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2,70,100],"novel":[3],"online":[4],"method":[5],"of":[6,31,46,50,59,69,94],"identifying":[7],"the":[8,18,29,43,47,56,67,80,89,92],"preferred":[9],"NUMA":[10,34],"nodes":[11],"for":[12,42,62,99],"objects":[13],"with":[14],"negligible":[15],"overhead":[16,93],"during":[17],"garbage":[19,101],"collection":[20],"time":[21],"as":[22,24,86],"well":[23],"object":[25],"allocation":[26],"time.":[27],"Since":[28],"number":[30],"CPUs":[32],"(or":[33],"nodes)":[35],"is":[36,40,97],"increasing":[37],"recently,":[38],"it":[39],"critical":[41],"memory":[44,61,84],"manager":[45],"runtime":[48,81],"environment":[49],"an":[51,75],"object-oriented":[52],"language":[53],"to":[54],"exploit":[55],"low":[57],"latency":[58],"local":[60],"high":[63,98],"performance.":[64],"To":[65],"locate":[66],"CPU":[68],"thread":[71],"that":[72],"frequently":[73],"accesses":[74,85],"object,":[76],"prior":[77],"research":[78],"uses":[79],"information":[82],"about":[83],"sampled":[87],"by":[88],"hardware.":[90],"However,":[91],"this":[95],"approach":[96],"collector.":[102]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
