Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions., , , and . IEEE Comput. Archit. Lett., 20 (2): 162-165 (2021)Understanding Selective Delay as a Method for Efficient Secure Speculative Execution., , , , and . IEEE Trans. Computers, 69 (11): 1584-1595 (2020)Maximizing Limited Resources: a Limit-Based Study and Taxonomy of Out-of-Order Commit., , , and . J. Signal Process. Syst., 91 (3-4): 379-397 (2019)Where replacement algorithms fail: a thorough analysis., , and . Conf. Computing Frontiers, page 141-150. ACM, (2010)Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power., , , and . PACS, volume 2008 of Lecture Notes in Computer Science, page 82-96. Springer, (2000)Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks., , and . CoRR, (2021)Evaluating the Potential Applications of Quaternary Logic for Approximate Computing., , , and . ACM J. Emerg. Technol. Comput. Syst., 16 (1): 5:1-5:25 (2020)Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory., , , , and . HPDC, page 3-14. ACM, (2015)DataScalar Architectures., , and . ISCA, page 338-349. ACM, (1997)Doppelganger Loads: A Safe, Complexity-Effective Optimization for Secure Speculation Schemes., , , and . ISCA, page 53:1-53:13. ACM, (2023)