Author of the publication

A Directive Generation Approach Using User-Defined Rules.

, , , and . CANDAR, page 515-521. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Xevolver: A code transformation framework for separation of system-awareness from application codes., , , , , and . Concurr. Comput. Pract. Exp., (2020)A Light-Weight Rollback Mechanism for Testing Kernel Variants in Auto-Tuning., , and . IEICE Trans. Inf. Syst., 98-D (12): 2178-2186 (2015)FLEXII: A Flexible Insertion Policy for Dynamic Cache Resizing Mechanisms., , , and . IEICE Trans. Electron., 98-C (7): 550-558 (2015)Exploiting the Potentials of the Second Generation SX-Aurora TSUBASA., , , , , , and . PMBS@SC, page 39-49. IEEE, (2020)Automated selection of build configuration based on machine learning., , , , and . IPDPS Workshops, page 934-941. IEEE, (2022)Automatic Hyperparameter Tuning of Machine Learning Models under Time Constraints., , , , and . IEEE BigData, page 4967-4973. IEEE, (2018)Failure Prediction in Datacenters Using Unsupervised Multimodal Anomaly Detection., , , , and . IEEE BigData, page 3545-3549. IEEE, (2020)mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations., , , , , , , , , and 22 other author(s). DASC/PiCom/CBDCom/CyberSciTech, page 1-7. IEEE, (2022)Resisting Sybil Attack By Social Network and Network Clustering., , , and . SAINT, page 15-21. IEEE Computer Society, (2010)Consideration of Resource Access History for Optimizing Overlay Networks in P2P-Based Resource Discovery., , , and . SAINT, page 269-272. IEEE Computer Society, (2008)