Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replication-aware leakage management in chip multiprocessors with private L2 cache., , and . ISLPED, page 135-140. ACM, (2010)SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling., , , , , , and . HPCA, page 333-346. IEEE, (2023)An Integrated Robot Vision System for Multiple Human Tracking and Silhouette Extraction., , , , and . ICAT, volume 4282 of Lecture Notes in Computer Science, page 575-583. Springer, (2006)BCD deduplication: effective memory compression using partial cache-line deduplication., , , , and . ASPLOS, page 52-64. ACM, (2021)TWiCe: preventing row-hammering by exploiting time window counters., , , , and . ISCA, page 385-396. ACM, (2019)Scatter-Add in Data Parallel Architectures., , and . HPCA, page 132-142. IEEE Computer Society, (2005)NDA: Near-DRAM acceleration architecture leveraging commodity DRAM devices and standard memory modules., , , and . HPCA, page 283-295. IEEE Computer Society, (2015)Stream Register Files with Indexed Access., , , and . HPCA, page 60-72. IEEE Computer Society, (2004)Accelerating Linked-list Traversal Through Near-Data Processing., , , , , and . PACT, page 113-124. ACM, (2016)Human Silhouette Extraction Method Using Region Based Background Subtraction., and . MIRAGE, volume 4418 of Lecture Notes in Computer Science, page 412-420. Springer, (2007)