Author of the publication

Single-level integrity and confidentiality protection for distributed shared memory multiprocessors.

, , , , and . HPCA, page 161-172. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Flow Spanners., and . LATIN, volume 3887 of Lecture Notes in Computer Science, page 410-422. Springer, (2006)HeadPager: Page Turning with Computer Vision Based Head Interaction., , , and . ACCV Workshops (3), volume 10118 of Lecture Notes in Computer Science, page 249-257. Springer, (2016)Collective Tree 1-Spanners for Interval Graphs., , , and . WG, volume 3787 of Lecture Notes in Computer Science, page 151-162. Springer, (2005)Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs., , and . WADS, volume 5664 of Lecture Notes in Computer Science, page 566-577. Springer, (2009)Additive Spanners for k-Chordal Graphs., , and . CIAC, volume 2653 of Lecture Notes in Computer Science, page 96-107. Springer, (2003)Collective tree spanners of graphs., , and . SIAM J. Discret. Math., 20 (1): 241-260 (2006)Just-in-time defect prediction for software hunks., , , , , and . Softw. Pract. Exp., 52 (1): 130-153 (2022)Improving Cost, Performance, and Security of Memory Encryption and Authentication., , , , and . ISCA, page 179-190. IEEE Computer Society, (2006)BAA-Net: attention-based CNN for automatic placental segmentation of MR images., , and . Medical Imaging: Image Processing, volume 12032 of SPIE Proceedings, SPIE, (2022)KBEE: Linux Kernel Vulnerability Exploitability Exploration., , , , and . ICCEIC, page 10-15. IEEE, (2023)