From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating the Potential Applications of Quaternary Logic for Approximate Computing., , , и . ACM J. Emerg. Technol. Comput. Syst., 16 (1): 5:1-5:25 (2020)Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks., , и . CoRR, (2021)Understanding Selective Delay as a Method for Efficient Secure Speculative Execution., , , , и . IEEE Trans. Computers, 69 (11): 1584-1595 (2020)Where replacement algorithms fail: a thorough analysis., , и . Conf. Computing Frontiers, стр. 141-150. ACM, (2010)Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power., , , и . PACS, том 2008 из Lecture Notes in Computer Science, стр. 82-96. Springer, (2000)Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions., , , и . IEEE Comput. Archit. Lett., 20 (2): 162-165 (2021)Maximizing Limited Resources: a Limit-Based Study and Taxonomy of Out-of-Order Commit., , , и . J. Signal Process. Syst., 91 (3-4): 379-397 (2019)Splash-4: A Modern Benchmark Suite with Lock-Free Constructs., , , и . IISWC, стр. 51-64. IEEE, (2022)Non-Speculative Load-Load Reordering in TSO., , , и . ISCA, стр. 187-200. ACM, (2017)TCP: Tag Correlating Prefetchers., , и . HPCA, стр. 317-326. IEEE Computer Society, (2003)