Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scale-out processors, , , , , , , , , and . volume 40 of 3, IEEE Computer Society, (2012)Making Address-Correlated Prefetching Practical., , , , and . IEEE Micro, 30 (1): 50-59 (2010)Waverunner: An Elegant Approach to Hardware Acceleration of State Machine Replication., , , , , and . NSDI, page 357-374. USENIX Association, (2023)AppBastion: Protection from Untrusted Apps and OSes on ARM., , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 692-715. Springer, (2022)Scale-out processors., , , , , , , , , and 1 other author(s). ISCA, page 500-511. IEEE Computer Society, (2012)Maximizing CNN Accelerator Efficiency Through Resource Partitioning., , and . CoRR, (2016)Quantifying the Mismatch between Emerging Scale-Out Applications and Modern Processors., , , , , , , , , and . ACM Trans. Comput. Syst., 30 (4): 15:1-15:24 (2012)Swarm model checking on the GPU., , , and . Int. J. Softw. Tools Technol. Transf., 22 (5): 583-599 (2020)Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust., , , and . SP, page 2130-2144. IEEE, (2022)Flick: Fast and Lightweight ISA-Crossing Call for Heterogeneous-ISA Environments., , , , and . ISCA, page 187-198. IEEE, (2020)