Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faster Neural Network Training with Approximate Tensor Operations., and . CoRR, (2018)Fast Multiplication in Binary Fields on GPUs via Register Cache., , , and . ICS, page 35:1-35:12. ACM, (2016)DYNAMO - DirectorY, Net Archiver and MOver., , and . GRID, volume 2536 of Lecture Notes in Computer Science, page 256-267. Springer, (2002)Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices., , , , , , and . Proc. Priv. Enhancing Technol., 2018 (4): 141-158 (2018)Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow., , , , , , , , , and . IEEE Micro, 39 (3): 66-74 (2019)A Computational Approach to Packet Classification., , and . IEEE/ACM Trans. Netw., 30 (3): 1073-1087 (2022)Revizor: Fuzzing for Leaks in Black-box CPUs., , , and . CoRR, (2021)Reconsidering OS memory optimizations in the presence of disaggregated memory., , , , and . ISMM, page 1-14. ACM, (2022)SwitchVM: Multi-Tenancy for In-Network Computing., and . SYSTOR, page 148. ACM, (2023)Neural Networks for Computer Systems., , and . SYSTOR, page 147. ACM, (2023)