Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Trusted Computing and Model Checking to Build Dependable Virtual Machines., and . HotDep, USENIX Association, (2014)TCP: A Tensor Contraction Processor for AI Workloads Industrial Product., , , , , , , , , and 39 other author(s). ISCA, page 890-902. IEEE, (2024)Automatic equivalence checking of programs with uninterpreted functions and integer arithmetic., and . Int. J. Softw. Tools Technol. Transf., 18 (4): 359-374 (2016)Torchy: A Tracing JIT Compiler for PyTorch.. CC, page 98-109. ACM, (2023)Checking Beliefs in Dynamic Networks., , , , and . NSDI, page 499-512. USENIX Association, (2015)Practical verification of peephole optimizations with Alive., , , and . Commun. ACM, 61 (2): 84-91 (2018)An SMT Encoding of LLVM's Memory Model for Bounded Translation Validation., , , and . CAV (2), volume 12760 of Lecture Notes in Computer Science, page 752-776. Springer, (2021)Supercharging Plant Configurations Using Z3., , , , and . CPAIOR, volume 12735 of Lecture Notes in Computer Science, page 1-25. Springer, (2021)openSDK: an open-source implementation of OPEN-R., and . AAMAS (3), page 1207-1210. IFAAMAS, (2008)Fast BGP Simulation of Large Datacenters., and . VMCAI, volume 11388 of Lecture Notes in Computer Science, page 386-408. Springer, (2019)