Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Machine Learning Architectures and Systems., , and . ACM Great Lakes Symposium on VLSI, page 499-506. ACM, (2020)CommonGraph: Graph Analytics on Evolving Data., , , , and . ASPLOS (2), page 133-145. ACM, (2023)TPM-SIM: a framework for performance evaluation of trusted platform modules., , , , and . DAC, page 236-241. ACM, (2011)Rendered Insecure: GPU Side Channel Attacks are Practical., , , and . CCS, page 2139-2153. ACM, (2018)Branch regulation: Low-overhead protection from code reuse attacks., , , and . ISCA, page 94-105. IEEE Computer Society, (2012)Analysis of TCP Performance on Wireless Ad Hoc Networks Utilizing Preemptive Maintenance Routing., , and . ICPP, page 232-239. IEEE Computer Society, (2001)Controlled Contention: Balancing Contention and Reservation in Multicore Application Scheduling., , and . IPDPS, page 946-955. IEEE Computer Society, (2015)Performance Benefits of Optimism in Fossil Collection., , , and . HICSS, IEEE Computer Society, (1999)Performance Characterization of Parallel Discrete Event Simulation on Knights Landing Processor., , , and . SIGSIM-PADS, page 121-132. ACM, (2017)Getting CS undergraduates to communicate effectively., , , , , , and . ITiCSE, page 283-287. ACM, (2011)