Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA-Based Remote Power Side-Channel Attacks., and . IEEE Symposium on Security and Privacy, page 229-244. IEEE Computer Society, (2018)Tectonic-Shift: A Composite Storage Fabric for Large-Scale ML Training., , , , , , , , , and 7 other author(s). USENIX Annual Technical Conference, page 433-449. USENIX Association, (2023)Understanding and Co-designing the Data Ingestion Pipeline for Industry-Scale RecSys Training., , , , , , , , , and 7 other author(s). CoRR, (2021)RecD: Deduplication for End-to-End Deep Learning Recommendation Model Training Infrastructure., , , , , , , , , and 2 other author(s). CoRR, (2022)To Centralize or Not to Centralize: A Tale of Swarm Coordination., , , , , , , , , and . CoRR, (2018)SlipStream: Adapting Pipelines for Distributed Training of Large DNNs Amid Failures., , , and . CoRR, (2024)Llama: A Heterogeneous & Serverless Framework for Auto-Tuning Video Analytics Pipelines., , , and . SoCC, page 1-17. ACM, (2021)RecD: Deduplication for End-to-End Deep Learning Recommendation Model Training Infrastructure., , , , , , , , , and 2 other author(s). MLSys, mlsys.org, (2023)Understanding data storage and ingestion for large-scale deep recommendation model training: industrial product., , , , , , , , , and 7 other author(s). ISCA, page 1042-1057. ACM, (2022)ShEF: shielded enclaves for cloud FPGAs., , and . ASPLOS, page 1070-1085. ACM, (2022)