Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recurrent Neural Networks Meet Context-Free Grammar: Two Birds with One Stone., , , , , and . ICDM, page 1078-1083. IEEE, (2021)An Empirical Study of Memory Pool Based Allocation and Reuse in CUDA Graph., , , and . ICA3PP (5), volume 14491 of Lecture Notes in Computer Science, page 394-406. Springer, (2023)SpecPMT: Speculative Logging for Resolving Crash Consistency Overhead of Persistent Memory., , , , , , and . ASPLOS (2), page 762-777. ACM, (2023)Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard Environment., , , , , and . TrustCom/BigDataSE/ICESS, page 844-852. IEEE Computer Society, (2017)Frame Buffer Compression without Color Information Loss., , , and . CIT, page 12-17. IEEE Computer Society, (2012)Retention state-enabled and progress-driven energy management for self-powered nonvolatile processors., , , , , , and . RTCSA, page 1-8. IEEE Computer Society, (2017)Data Enclave: A Data-Centric Trusted Execution Environment., , , , and . HPCA, page 218-232. IEEE, (2024)Energy-Efficient Cache Management for NVM-Based IoT Systems., , , , and . ISPA/IUCC, page 491-493. IEEE, (2017)Fast Confidence Detection: One Hot Way to Detect Adversarial Attacks via Sensor Pattern Noise Fingerprinting., , , , , , and . FPGA, page 188-189. ACM, (2019)A Dual-Threshold Scheme Along with Security Reinforcement for Energy Efficient Nonvolatile Processors., , , , and . ISVLSI, page 70-75. IEEE Computer Society, (2018)