Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replication-aware leakage management in chip multiprocessors with private L2 cache., , and . ISLPED, page 135-140. ACM, (2010)Human Silhouette Extraction Method Using Region Based Background Subtraction., and . MIRAGE, volume 4418 of Lecture Notes in Computer Science, page 412-420. Springer, (2007)SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling., , , , , , and . HPCA, page 333-346. IEEE, (2023)TWiCe: preventing row-hammering by exploiting time window counters., , , , and . ISCA, page 385-396. ACM, (2019)BCD deduplication: effective memory compression using partial cache-line deduplication., , , , and . ASPLOS, page 52-64. ACM, (2021)An Integrated Robot Vision System for Multiple Human Tracking and Silhouette Extraction., , , , and . ICAT, volume 4282 of Lecture Notes in Computer Science, page 575-583. Springer, (2006)Stream Register Files with Indexed Access., , , and . HPCA, page 60-72. IEEE Computer Society, (2004)Scatter-Add in Data Parallel Architectures., , and . HPCA, page 132-142. IEEE Computer Society, (2005)NDA: Near-DRAM acceleration architecture leveraging commodity DRAM devices and standard memory modules., , , and . HPCA, page 283-295. IEEE Computer Society, (2015)Dynamic bandwidth scaling for embedded DSPs with 3D-stacked DRAM and wide I/Os., , , , , , and . ICCAD, page 747-754. IEEE, (2013)