Author of the publication

Automatic benchmark generation for cache optimization of matrix operations.

, and . ACM Southeast Regional Conference, page 195-204. ACM, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandwidth Limits in the Intel Xeon Max (Sapphire Rapids with HBM) Processors.. ISC Workshops, volume 13999 of Lecture Notes in Computer Science, page 403-413. Springer, (2023)#COVIDisAirborne: AI-enabled multiscale computational microscopy of delta SARS-CoV-2 in a respiratory aerosol., , , , , , , , , and 42 other author(s). Int. J. High Perform. Comput. Appl., 37 (1): 28-44 (2023)A Highly Efficient Multicore Floating-Point FFT Architecture Based on Hybrid Linear Algebra/FFT Cores., , and . J. Signal Process. Syst., 77 (1-2): 169-190 (2014)The SGI Origin software environment and application performance., , , , and . COMPCON, page 165-170. IEEE Computer Society, (1997)Intelligent resolution: Integrating Cryo-EM with AI-driven multi-resolution simulations to observe the severe acute respiratory syndrome coronavirus-2 replication-transcription machinery in action., , , , , , , , , and 24 other author(s). Int. J. High Perform. Comput. Appl., 36 (5-6): 603-623 (2022)Evaluation and optimization of multicore performance bottlenecks in supercomputing applications., , , , , and . ISPASS, page 32-43. IEEE Computer Society, (2011)Trends in system cost and performance balances and implications for the future of HPC.. Co-HPC@SC, page 2:1. ACM, (2015)Application Performance Analysis: A Report on the Impact of Memory Bandwidth., , , , , , , , , and 4 other author(s). ISC Workshops, volume 13999 of Lecture Notes in Computer Science, page 339-352. Springer, (2023)Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects., , , , and . USENIX Security Symposium, page 2857-2874. USENIX Association, (2022)Automatic benchmark generation for cache optimization of matrix operations., and . ACM Southeast Regional Conference, page 195-204. ACM, (1995)