Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SYNERGY: Rethinking Secure-Memory Design for Error-Correcting Memories., , , , and . HPCA, page 454-465. IEEE Computer Society, (2018)SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface., , , and . CoRR, (2022)Accurate system-level performance modeling and workload characterization for mobile internet devices., , , , and . MEDEA@PACT, page 54-60. ACM, (2008)Shredder: Learning Noise to Protect Privacy with Partial DNN Inference on the Edge., , , , and . CoRR, (2019)Reducing Data Movement and Energy in Multilevel Cache Hierarchies without Losing Performance: Can you have it all?, , , and . PACT, page 383-394. IEEE, (2019)SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface., , , and . DSN, page 14-27. IEEE, (2023)A case for dynamic pipeline scaling., , , , and . CASES, page 1-8. ACM, (2002)BBB: Simplifying Persistent Programming using Battery-Backed Buffers., , , , and . HPCA, page 111-124. IEEE, (2021)Shredder: Learning Noise Distributions to Protect Inference Privacy., , , , , and . ASPLOS, page 3-18. ACM, (2020)ASPLOS 2020 was canceled because of COVID-19..Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories., , , , , and . MICRO, page 416-427. IEEE Computer Society, (2018)