Author of the publication

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation.

, , and . PODC, page 305-313. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factor-Based C-AMAT Analysis for Memory Optimization., , , , and . VECoS, volume 10466 of Lecture Notes in Computer Science, page 79-91. Springer, (2017)Applying multiple criteria decision making to improve security architecture development., , and . InfoSecu, page 244-246. ACM, (2004)Activity recognition with weighted frequent patterns mining in smart environments., , and . Expert Syst. Appl., 42 (17-18): 6423-6432 (2015)An implementation of analytical power model on integrated GPU., , , , , and . ISIC, page 1-4. IEEE, (2016)Protecting Mass Data Basing on Small Trusted Agent., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 362-373. Springer, (2005)A 6.35Mbps 1024-bit RSA crypto coprocessor in a 0.18um CMOS technology., , , and . VLSI-SoC, page 216-221. IEEE, (2006)An Efficient Direct Memory Access (DMA) Controller for Scientific Computing Accelerators., , , , and . ISCAS, page 1-5. IEEE, (2019)Adaptive VC Partitioning for NoCs in GPGPUs., , , , , , and . ISCAS, page 1-5. IEEE, (2018)Mac or Non-MAC: not a Problem., , , , and . J. Circuits Syst. Comput., (2014)An accurate and highly-efficient performance evaluation approach based on queuing model for on-chip network., , , and . Sci. China Inf. Sci., 56 (7): 1-20 (2013)