Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote Control: A Simple Deadlock Avoidance Scheme for Modular System on Chip., , , , and . CoRR, (2019)Communication Algorithm-Architecture Co-Design for Distributed Deep Learning., , , , , and . ISCA, page 181-194. IEEE, (2021)Continual Learning Approach for Improving the Data and Computation Mapping in Near-Memory Processing System., , , , , , and . CoRR, (2021)Enhancing Collective Communication in MCM Accelerators for Deep Learning Training., , , , , and . HPCA, page 1-16. IEEE, (2024)WHISTLE: CPU Abstractions for Hardware and Software Memory Safety Invariants., , , , , , and . IEEE Trans. Computers, 72 (3): 811-825 (March 2023)Computing En-Route for Near-Data Processing., , , , , , and . IEEE Trans. Computers, 70 (6): 906-921 (2021)Remote Control: A Simple Deadlock Avoidance Scheme for Modular Systems-on-Chip., , , , and . IEEE Trans. Computers, 70 (11): 1928-1941 (2021)Active-Routing: Compute on the Way for Near-Data Processing., , , , , , and . HPCA, page 674-686. IEEE, (2019)Attacks of the Knights: Exploiting Non Uniform Cache Access Time., , , , , , , and . CoRR, (2021)Attack of the Knights: Non Uniform Cache Side Channel Attack., , , , , and . ACSAC, page 691-703. ACM, (2023)