From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating Application Vulnerability to Soft Errors in Multi-level Cache Hierarchy., , , и . Euro-Par Workshops (2), том 7156 из Lecture Notes in Computer Science, стр. 272-281. Springer, (2011)Efficient Instruction Scheduling using Real-time Load Delay Tracking., и . CoRR, (2021)Rectified Linear Postsynaptic Potential Function for Backpropagation in Deep Spiking Neural Networks., , , , , , , , , и 1 other автор(ы). IEEE Trans. Neural Networks Learn. Syst., 33 (5): 1947-1958 (2022)Sentry-NoC: a statically-scheduled NoC for secure SoCs., , , и . NOCS, стр. 67-74. ACM, (2021)HidFix: Efficient Mitigation of Cache-Based Spectre Attacks Through Hidden Rollbacks., , и . ICCAD, стр. 1-9. IEEE, (2023)Non-Speculative Load-Load Reordering in TSO., , , и . ISCA, стр. 187-200. ACM, (2017)System-level power/performance evaluation of 3D stacked DRAMs for mobile applications., , , , , , , и . DATE, стр. 923-928. IEEE, (2009)Micro-architecture independent analytical processor performance and power modeling., , , , , , , и . ISPASS, стр. 32-41. IEEE Computer Society, (2015)Fully Randomized Pointers., , , и . CoRR, (2024)3DRA: Dynamic Data-Driven Reconfigurable Architecture., , , и . IEEE Access, (2023)