Author of the publication

Leakage-efficient design of value predictors through state and non-state preserving techniques.

, , , and . J. Supercomput., 55 (1): 28-50 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions., , , and . IEEE Comput. Archit. Lett., 20 (2): 162-165 (2021)Maximizing Limited Resources: a Limit-Based Study and Taxonomy of Out-of-Order Commit., , , and . J. Signal Process. Syst., 91 (3-4): 379-397 (2019)Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power., , , and . PACS, volume 2008 of Lecture Notes in Computer Science, page 82-96. Springer, (2000)Understanding Selective Delay as a Method for Efficient Secure Speculative Execution., , , , and . IEEE Trans. Computers, 69 (11): 1584-1595 (2020)Evaluating the Potential Applications of Quaternary Logic for Approximate Computing., , , and . ACM J. Emerg. Technol. Comput. Syst., 16 (1): 5:1-5:25 (2020)Where replacement algorithms fail: a thorough analysis., , and . Conf. Computing Frontiers, page 141-150. ACM, (2010)Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks., , and . CoRR, (2021)Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory., , , , and . HPDC, page 3-14. ACM, (2015)Improving CC-NUMA Performance Using Instruction-Based Prediction., and . HPCA, page 161-170. IEEE Computer Society, (1999)POSTER: Efficient Self-Invalidation/Self-Downgrade for Critical Sections with Relaxed Semantics., , , and . PACT, page 433-434. ACM, (2016)