Author of the publication

Software Techniques for Avoiding Hardware Virtualization Exits.

, , , and . USENIX Annual Technical Conference, page 373-385. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Escape and Effect Analysis for Building Lightweight Method Summaries., and . CC, volume 4420 of Lecture Notes in Computer Science, page 172-186. Springer, (2007)Maintaining Doubly-Linked List Invariants in Shape Analysis with Local Reasoning., and . VMCAI, volume 4349 of Lecture Notes in Computer Science, page 234-250. Springer, (2007)Compile-time deallocation of individual objects., and . ISMM, page 138-149. ACM, (2006)Compiler-Enhanced Incremental Checkpointing., , , and . LCPC, volume 5234 of Lecture Notes in Computer Science, page 1-15. Springer, (2007)Automatic Parallelization of Divide and Conquer Algorithms., and . PPoPP, page 72-83. ACM, (1999)Pointer Analysis for Multithreaded Programs., and . PLDI, page 77-90. ACM, (1999)Recursion Unrolling for Divide and Conquer Programs., and . LCPC, volume 2017 of Lecture Notes in Computer Science, page 34-48. Springer, (2000)Design-Driven Compilation., and . CC, volume 2027 of Lecture Notes in Computer Science, page 150-164. Springer, (2001)Practical memory leak detection using guarded value-flow analysis., , and . PLDI, page 480-491. ACM, (2007)Symbolic bounds analysis of pointers, array indices, and accessed memory regions., and . PLDI, page 182-195. ACM, (2000)