From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit., , , и . HPCA, стр. 123-138. IEEE, (2020)Using Software Logging to Support Multi-Version Buffering in Thread-Level Speculation., , , , , и . IEEE PACT, стр. 170-181. IEEE Computer Society, (2003)A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms., , , и . MILCOM, стр. 855-860. IEEE, (2021)ReEnact: Using Thread-Level Speculation Mechanisms to Debug Data Races in Multithreaded Codes., и . ISCA, стр. 110-121. IEEE Computer Society, (2003)CORD: cost-effective (and nearly overhead-free) order-recording and data race detection.. HPCA, стр. 232-243. IEEE Computer Society, (2006)Transactional pre-abort handlers in hardware transactional memory., , и . PACT, стр. 33:1-33:11. ACM, (2018)SecureME: a hardware-software approach to full system security., , , и . ICS, стр. 108-119. ACM, (2011)Capacity of Deliberate Side-Channels Created by Software Activities., , и . MILCOM, стр. 237-242. IEEE, (2018)Modelling Jitter in Wireless Channel Created by Processor-Memory Activity., , и . ICASSP, стр. 2037-2041. IEEE, (2018)PEEP: Exploiting predictability of memory dependences in SMT processors., , и . HPCA, стр. 137-148. IEEE Computer Society, (2008)