From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Transpose-xen: virtualized mixed-criticality through dynamic allocation., и . SAC, стр. 3-12. ACM, (2022)Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems., , , , и . HPCA, стр. 139-152. IEEE, (2021)PreFAM: Understanding the Impact of Prefetching in Fabric-Attached Memory Architectures., , , , и . MEMSYS, стр. 323-334. ACM, (2020)HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication., , , , и . ACM Trans. Embed. Comput. Syst., 22 (4): 64:1-64:28 (июля 2023)SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs., , и . ISCAS, стр. 1-5. IEEE, (2023)Towards resilient analog in-memory deep learning via data layout re-organization., , , и . DAC, стр. 859-864. ACM, (2022)Avoiding TLB Shootdowns Through Self-Invalidating TLB Entries., , , , и . PACT, стр. 273-287. IEEE Computer Society, (2017)Persistently-Secure Processors: Challenges and Opportunities for Securing Non-Volatile Memories., , , , и . ISVLSI, стр. 610-614. IEEE, (2019)Non-volatile memory host controller interface performance analysis in high-performance I/O systems., , и . ISPASS, стр. 145-154. IEEE Computer Society, (2015)Salus: Efficient Security Support for CXL-Expanded GPU Memory., , , и . HPCA, стр. 1-15. IEEE, (2024)