Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GPSR: greedy perimeter stateless routing for wireless networks., and . MobiCom, page 243-254. ACM, (2000)Full-stack optimization for accelerating CNNs using powers-of-two weights with FPGA validation., , , and . ICS, page 449-460. ACM, (2019)The Warp Computer: Architecture, Implementation, and Performance., , , , , , and . IEEE Trans. Computers, 36 (12): 1523-1538 (1987)Warp experience: we can map computations onto a parallel computer efficiently.. ICS, page 668-675. ACM, (1988)Behavior of Competing TCP Connections on a Packet-Switched Ring: A Study Using the Harvard TCP/IP Network Simulator., and . PDPTA, page 2143-2149. CSREA Press, (1999)Architecture of Warp., , , , , , , , , and . COMPCON, page 264-267. IEEE Computer Society, (1987)Packing Sparse Convolutional Neural Networks for Efficient Systolic Array Implementations: Column Combining Under Joint Optimization., , and . ASPLOS, page 821-834. ACM, (2019)Memory requirements for balanced computer architectures.. J. Complex., 1 (1): 147-157 (1985)FAST: DNN Training Under Variable Precision Block Floating Point with Stochastic Rounding., , and . HPCA, page 846-860. IEEE, (2022)DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements., , and . HotSec, USENIX Association, (2011)