Author of the publication

A Split L2 Data Cache for Scalable Cc-numa Multiprocessors.

, , and . Journal of Circuits, Systems, and Computers, 14 (3): 605-618 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Analysis on Caching Effect of I-Structure Data in Frame-Based Multithreaded Processing., , and . ICPP, page 122-127. IEEE Computer Society, (1997)A Split L2 Data Cache for Scalable Cc-numa Multiprocessors., , and . Journal of Circuits, Systems, and Computers, 14 (3): 605-618 (2005)A Method of Constructing Malware Classification Dataset Using Clustering., and . TPS-ISA, page 124-129. IEEE, (2022)Utilization of the On-Chip L2 Cache Area in CC-NUMA Multiprocessors for Applications with a Small Working Set., , and . IEICE Trans. Inf. Syst., 87-D (7): 1617-1624 (2004)Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization., , , and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 629-639. Springer, (2011)Accelerating the Continuous Data in a SCI-Based Multimedia System., , and . ICPADS, page 171-178. IEEE Computer Society, (2001)Host-Based Malware Variants Detection Method Using Logs., and . J. Inf. Process. Syst., 17 (4): 851-865 (2021)Distance-aware L2 Cache Organizations for Scalable Multiprocessor Systems., , and . DSD, page 24-32. IEEE Computer Society, (2003)A Decoupled Scheduled Dataflow Multithreaded Architecture., , , and . ISPAN, page 138-143. IEEE Computer Society, (1999)A Greedy Algorithm for Generating Malware Signatures Based on Association., and . BigComp, page 52-55. IEEE, (2022)