Author of the publication

Affine transformations for communication minimal parallelization and locality optimization of arbitrarily nested loop sequences

, , , , , and . OSU-CISRC-5/07-TR43. The Ohio State University, (May 2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond reuse distance analysis: Dynamic analysis for characterization of data locality potential., , , , , , , and . ACM Trans. Archit. Code Optim., 10 (4): 53:1-53:29 (2013)Generating run-time progress reports for a points-to analysis in Eclipse., , and . ETX, page 40-44. ACM, (2006)Beyond Reuse Distance Analysis: Dynamic Analysis for Characterization of Data Locality Potential., , , , , , , and . CoRR, (2014)Scalable Runtime Bloat Detection Using Abstract Dynamic Slicing., , , , , and . ACM Trans. Softw. Eng. Methodol., 23 (3): 23:1-23:50 (2014)Sentinel: generating GUI tests for sensor leaks in Android and Android wear apps., , , and . Softw. Qual. J., 28 (1): 335-367 (2020)Fragment Class Analysis for Testing of Polymorphism in Java Software., , and . IEEE Trans. Software Eng., 30 (6): 372-387 (2004)Efficient Distributed Algorithms for Convolutional Neural Networks., , , , and . SPAA, page 439-442. ACM, (2021)SDSLc: a multi-target domain-specific compiler for stencil computations., , , , , , , , and . WOLFHPC@SC, page 6:1-6:10. ACM, (2015)Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis., , and . ECOOP, volume 5653 of Lecture Notes in Computer Science, page 98-122. Springer, (2009)Introducing Differential Privacy Mechanisms for Mobile App Analytics of Dynamic Content., , , , and . ICSME, page 267-277. IEEE, (2020)