Author of the publication

Microarchitecture of a Configurable High-Radix Router for the Post-Moore Era.

, , , , , and . ISC, volume 12728 of Lecture Notes in Computer Science, page 3-17. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust $H_ınfty$ Output Feedback Control of a Rotary Capacitive Power Transfer System., , , and . IEEE Access, (2019)A Cost-Efficient Router Architecture for HPC Inter-Connection Networks: Design and Implementation., , , and . IEEE Trans. Parallel Distributed Syst., 30 (4): 738-753 (2019)Algebraic method of regional green wave coordinated control., , , , and . J. Intell. Transp. Syst., 27 (6): 799-817 (November 2023)AVPredictor: Comprehensive prediction and detection of atomicity violations., , , and . Concurr. Comput. Pract. Exp., (2019)ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference., , , , , and . J. Comput. Sci. Technol., 37 (2): 405-422 (2022)Constructing a database for the relations between CNV and human genetic diseases via systematic text mining., , , , , , , and . BMC Bioinform., 19-S (19): 125-134 (2018)Optimization Model of Regional Green Wave Coordination Control for the Coordinated Path Set., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (7): 7000-7011 (2023)UltraFuzz: Towards Resource-Saving in Distributed Fuzzing., , , , , , , , and . IEEE Trans. Software Eng., 49 (4): 2394-2412 (April 2023)The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques., , , , , and . CoRR, (2019)TianheGraph: Customizing Graph Search for Graph500 on Tianhe Supercomputer., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (4): 941-951 (2022)