Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black-Box Access is Insufficient for Rigorous AI Audits., , , , , , , , , and 11 other author(s). FAccT, page 2254-2272. ACM, (2024)Open-Sourcing Highly Capable Foundation Models: An evaluation of risks, benefits, and alternative methods for pursuing open-source objectives., , , , , , , , , and 12 other author(s). CoRR, (2023)Infrastructure for Exploring SIMT Architecture in General-Purpose Processors., , , , , , and . ISPASS, page 316-318. IEEE, (2024)Visibility into AI Agents., , , , , , , , , and 2 other author(s). FAccT, page 958-973. ACM, (2024)Incorporating Shared Relevance Feedback into a Web Search Engine., and . WebNet, AACE, (1997)Staged memory scheduling: Achieving high performance and scalability in heterogeneous systems., , , , and . ISCA, page 416-427. IEEE Computer Society, (2012)HAT: Heterogeneous Adaptive Throttling for On-Chip Networks., , , and . SBAC-PAD, page 9-18. IEEE Computer Society, (2012)Direct Marketing, Indirect Profits: A Strategic Analysis of Dual - Channel Supply - Chain Design., , and . Manag. Sci., 49 (1): 1-20 (2003)Enabling Efficient Dynamic Resizing of Large DRAM Caches via A Hardware Consistent Hashing Mechanism., , , , , , , , and . CoRR, (2016)Further results on the WLS design of variable fractional delay filters., and . ICSPCS, page 1-7. IEEE, (2012)