Author of the publication

Bottleneck analysis in java applications using hardware performance monitors.

, , , and . OOPSLA Companion, page 172-173. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

64-bit versus 32-bit Virtual Machines for Java: Research Articles, , and . Softw. Pract. Exper., 36 (1): 1--26 (January 2006)Steganography for Executables and Code Transformation Signatures., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 425-439. Springer, (2004)A Model for Self-Modifying Code., , and . Information Hiding, volume 4437 of Lecture Notes in Computer Science, page 232-248. Springer, (2006)A Detailed Study on Phase Predictors., , and . Euro-Par, volume 3648 of Lecture Notes in Computer Science, page 571-581. Springer, (2005)Formal virtualization requirements for the ARM architecture., , , , and . J. Syst. Archit., 59 (3): 144-154 (2013)Improved composite confidence mechanisms for a perceptron branch predictor., , and . J. Syst. Archit., 52 (3): 143-151 (2006)Javana: a system for building customized Java program analysis tools., , , and . OOPSLA, page 153-168. ACM, (2006)Building Java program analysis tools using Javana., , , and . OOPSLA Companion, page 653-654. ACM, (2006)Protecting Your Software Updates., , and . IEEE Secur. Priv., 11 (2): 47-54 (2013)HiPEAC compilation architecture., and . MECO, page 13. IEEE, (2018)