From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Precise execution offloading for applications with dynamic behavior in mobile cloud computing., , , , , и . Pervasive Mob. Comput., (2016)Software controlled memory layout reorganization for irregular array access patterns., , , , и . CASES, стр. 179-188. ACM, (2007)A Graph Drawing Based Spatial Mapping Algorithm for Coarse-Grained Reconfigurable Architectures., , , , и . IEEE Trans. Very Large Scale Integr. Syst., 17 (11): 1565-1578 (2009)High Throughput Data Mapping for Coarse-Grained Reconfigurable Architectures., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 30 (11): 1599-1609 (2011)Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM., , , и . NDSS, The Internet Society, (2017)TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code., , , и . USENIX Security Symposium, стр. 6947-6964. USENIX Association, (2023)Towards a practical solution to detect code reuse attacks on ARM mobile devices., , , , и . HASP@ISCA, стр. 3:1-3:8. ACM, (2015)A spatial mapping algorithm for heterogeneous coarse-grained reconfigurable architectures., , , , , и . DATE, стр. 363-368. European Design and Automation Association, Leuven, Belgium, (2006)Design of a Generic Security Interface for RISC-V Processors and its Applications., , , , и . ISOCC, стр. 40-41. IEEE, (2018)The very portable optimizer for digital signal processors., и . CASES, стр. 84-92. ACM, (2001)