Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ad Hoc Transactions in Web Applications: The Good, the Bad, and the Ugly., , , , , , and . SIGMOD Conference, page 4-18. ACM, (2022)You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps., , , , , and . USENIX Security Symposium, page 657-690. USENIX Association, (2015)ISA-Grid: Architecture of Fine-grained Privilege Control for Instructions and Registers., , , , and . ISCA, page 15:1-15:15. ACM, (2023)Reducing world switches in virtualized environment with flexible cross-world calls., , , , and . ISCA, page 375-387. ACM, (2015)BeeHive: Sub-second Elasticity for Web Services with Semi-FaaS Execution., , , , , and . ASPLOS (2), page 74-87. ACM, (2023)Optimizing crash dump in virtualized environments., , and . VEE, page 25-36. ACM, (2010)Boosting the Performance of Multimedia Applications Using SIMD Instructions., , , , , , and . CC, volume 3443 of Lecture Notes in Computer Science, page 59-75. Springer, (2005)A New Approach to Pointer Analysis for Assignments., , , and . J. Comput. Sci. Technol., 16 (3): 242-250 (2001)A Web Service-Based Framework for Supply Chain Management., , , , and . ISORC, page 316-319. IEEE Computer Society, (2005)GCPersist: an efficient GC-assisted lazy persistency framework for resilient Java applications on NVM., , , , and . VEE, page 1-14. ACM, (2020)