Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate Computing: Making Mobile Systems More Efficient., , and . IEEE Pervasive Comput., 14 (2): 9-13 (2015)Symbolic execution of multithreaded programs from arbitrary program contexts., , and . OOPSLA, page 491-506. ACM, (2014)Input-covering schedules for multithreaded programs., , and . OOPSLA, page 677-692. ACM, (2013)IncBricks: Toward In-Network Computation with an In-Network Cache., , , , , and . ASPLOS, page 795-809. ACM, (2017)Approximate Storage of Compressed and Encrypted Videos., , , and . ASPLOS, page 361-373. ACM, (2017)Checked Load: Architectural support for JavaScript type-checking on mobile processors., , , and . HPCA, page 419-430. IEEE Computer Society, (2011)Characterizing the Performance and Energy Efficiency of Lock-Free Data Structures., , and . Interaction between Compilers and Computer Architectures, page 63-70. IEEE Computer Society, (2011)Atom-Aid: Detecting and Surviving Atomicity Violations., , , and . ISCA, page 277-288. IEEE Computer Society, (2008)Tasking with out-of-order spawn in TLS chip multiprocessors: microarchitecture and compilation., , , , , and . ICS, page 179-188. ACM, (2005)Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference., , and . NDSS, The Internet Society, (2020)