Author of the publication

Dynamic I/O-Aware Scheduling for Batch-Mode Applications on Chip Multiprocessor Systems of Cluster Platforms.

, , , , , , and . J. Comput. Sci. Technol., 29 (1): 21-37 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anna: A KVS for Any Scale., , , and . IEEE Trans. Knowl. Data Eng., 33 (2): 344-358 (2021)FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods., , , , , , , , and . CoRR, (2022)SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks., , , , , , , , and . CoRR, (2021)Making Information Hiding Effective Again., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2576-2594 (2022)Library Function Disposing Approach in Binary Translation., , , , and . J. Comput. Res. Dev., 43 (12): 2174-2179 (2006)SysMon: Monitoring Memory Behaviors via OS Approach., , , , and . APPT, volume 10561 of Lecture Notes in Computer Science, page 51-63. Springer, (2017)CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation., , , , , , , and . CCS, page 2989-3002. ACM, (2022)HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines., , , , , , , and . VEE, page 53-64. ACM, (2015)Localization of concurrency bugs using shared memory access pairs., , , , , , , , and . ASE, page 611-622. ACM, (2014)Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths., , , , , , and . USENIX Security Symposium, page 4365-4382. USENIX Association, (2022)