Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Network Traffic with Chimera., , and . login Usenix Mag., (2013)Polyhedral Optimization of TensorFlow Computation Graphs., , , , and . ESPT/VPA@SC, volume 11027 of Lecture Notes in Computer Science, page 74-89. Springer, (2017)HACCLE: metaprogramming for secure multi-party computation., , , , , , , , , and 10 other author(s). GPCE, page 130-143. ACM, (2021)Strictness Analysis in the Imperative Lambda Calculus., and . LISP Symb. Comput., 9 (1): 109-143 (1996)Extreme SAT-based Constraint solving with R-Solve., , , and . HPEC, page 1-6. IEEE, (2014)Chimera: A Declarative Language for Streaming Network Traffic Analysis., , and . USENIX Security Symposium, page 365-379. USENIX Association, (2012)Automatic Mapping and Optimization to Kokkos with Polyhedral Compilation., , , and . HPEC, page 1-7. IEEE, (2020)HACCLE: An Ecosystem for Building Secure Multi-Party Computations., , , , , , , , , and 9 other author(s). CoRR, (2020)Automatic Parallelization to Asynchronous Task-Based Runtimes Through a Generic Runtime Layer., , , and . HPEC, page 1-11. IEEE, (2019)Forest hashing: Expediting large scale image retrieval., , , , and . ICASSP, page 1681-1684. IEEE, (2013)