Author of the publication

Conquering the complexity mountain: Full-stack computer architecture teaching with FPGAs.

, , , , and . EWME, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CHERI: A Hardware-Software System to Support the Principle of Least Privilege., , and . ERCIM News, (2016)The design and implementation of a low-latency on-chip network., , and . ASP-DAC, page 164-169. IEEE, (2006)An Energy and Performance Exploration of Network-on-Chip Architectures., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 17 (3): 319-329 (2009)Position Paper: Defending Direct Memory Access with CHERI Capabilities., , , , , and . HASP@MICRO, page 7:1-7:9. ACM, (2020)How Flexible is CXL's Memory Protection?: Replacing a sledgehammer with a scalpel., , and . ACM Queue, 21 (3): 54-64 (2023)Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals., , , , , , and . NDSS, The Internet Society, (2019)A Network of Time-Division Multiplexed Wiring for FPGAs., , and . NOCS, page 35-44. IEEE Computer Society, (2008)Bluehive - A Field-Programable Custom Computing Machine for Extreme-Scale Real-Time Neural Network Simulation., , , , and . FCCM, page 133-140. IEEE Computer Society, (2012)Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety., , , , , , , , , and 2 other author(s). ASPLOS (2), page 251-268. ACM, (2024)Termination detection for fine-grained message-passing architectures., , , , , , , , and . ASAP, page 17-24. IEEE, (2020)