{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:11:58Z","timestamp":1761621118344,"version":"3.40.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/tdsc.2012.87","type":"journal-article","created":{"date-parts":[[2012,11,28]],"date-time":"2012-11-28T19:04:10Z","timestamp":1354129450000},"page":"114-127","source":"Crossref","is-referenced-by-count":8,"title":["Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing"],"prefix":"10.1109","volume":"10","author":[{"family":"Lide Duan","sequence":"first","affiliation":[]},{"family":"Lu Peng","sequence":"additional","affiliation":[]},{"family":"Bin Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2005.1430581"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1999.809458"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.82"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2007.19"},{"volume-title":"Classification and Regression Trees","year":"1984","author":"Breiman","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000000092"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/mascot.2008.4770557"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798244"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2011.6114203"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2011.5762741"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2699986"},{"article-title":"Sim-SODA: A Unified Framework for Architectural Level Software Reliability Analysis","volume-title":"Proc. Workshop Modeling, Benchmarking and Simulation","author":"Fu","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2003.1206992"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/1454115.1454146","article-title":"Analysis and Approximation of Optimal Co-Scheduling on Chip Multiprocessors","volume-title":"Proc. 17th Int\u2019l Conf. Parallel Architectures and Compilation Techniques (PACT)","author":"Jiang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168882"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168881"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771797"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.140"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.88"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2006.1598109"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1183401.1183428"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/545214.545227"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253181"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1145\/339647.339652","article-title":"Transient Fault Detection via Simultaneous Multithreading","volume-title":"Proc. Int\u2019l Symp. Computer Architecture (ISCA)","author":"Reinhardt"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781037"},{"key":"ref31","article-title":"M-SIM: A Flexible, Multithreaded Architectural Simulation Environment","volume-title":"Dept. of Computer Science, SUNY at Binghamton","author":"Sharkey","year":"2005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605403"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379244"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250725"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811096"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.10"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798243"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1816038.1816023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/232974.232993"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2002.1003565"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250726"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250719"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311877"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2004.1310780"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1995.524546"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1214\/009053605000000255"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2007.363747"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2008.4580167"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736036"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1147\/rd.401.0003"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8858\/6471975\/06363442.pdf?arnumber=6363442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T05:48:49Z","timestamp":1742276929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6363442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2012.87","relation":{},"ISSN":["1545-5971"],"issn-type":[{"type":"print","value":"1545-5971"}],"subject":[],"published":{"date-parts":[[2013,3]]}}}