Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review of DISC 2011., and . SIGACT News, 42 (4): 87-91 (2011)From bounded to unbounded concurrency objects and back., , and . PODC, page 119-128. ACM, (2011)Speculative Interference Attacks: Breaking Invisible Speculation Schemes., , , , , , , , , and 6 other author(s). CoRR, (2020)A Heap-Based Concurrent Priority Queue with Mutable Priorities for Faster Parallel Algorithms., , and . OPODIS, volume 46 of LIPIcs, page 15:1-15:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)CBTree: A Practical Concurrent Self-Adjusting Search Tree., , , , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 1-15. Springer, (2012)Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data., , , , , and . IEEE Micro, 40 (3): 81-90 (2020)Cache index-aware memory allocation., , and . ISMM, page 55-64. ACM, (2011)Speculative interference attacks: breaking invisible speculation schemes., , , , , , , , , and 6 other author(s). ASPLOS, page 1046-1060. ACM, (2021)V-Combiner: speeding-up iterative graph processing on a shared-memory platform with vertex merging., , , , , and . ICS, page 9:1-9:13. ACM, (2020)System-level crash safe sorting on persistent memory., , , , , and . SYSTOR, page 151. ACM, (2022)