Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correctness of Hierarchical MCS Locks with Timeout., , , and . CoRR, (2016)Pinpointing performance inefficiencies via lightweight variance profiling., , , and . SC, page 19:1-19:19. ACM, (2019)Precise event sampling-based data locality tools for AMD multicore architectures., , , and . Concurr. Comput. Pract. Exp., (2023)Unveiling and Vanquishing Goroutine Leaks in Enterprise Microservices: A Dynamic Analysis Approach., , and . CoRR, (2023)Runtime Value Numbering: A Profiling Technique to Pinpoint Redundant Computations., , and . PACT, page 254-265. IEEE Computer Society, (2015)Integrating Asynchronous Task Parallelism with MPI., , , , , , , and . IPDPS, page 712-725. IEEE Computer Society, (2013)ReuseTracker: Fast Yet Accurate Multicore Reuse Distance Analyzer., , , and . ACM Trans. Archit. Code Optim., 19 (1): 3:1-3:25 (2022)Unveiling and Vanquishing Goroutine Leaks in Enterprise Microservices: A Dynamic Analysis Approach., , and . CGO, page 411-422. IEEE, (2024)Efficient Abortable-locking Protocol for Multi-level NUMA Systems: Design and Correctness., , and . ACM Trans. Parallel Comput., 7 (3): 17:1-17:32 (2020)Path-Synchronous Performance Monitoring in HPC Interconnection Networks with Source-Code Attribution., and . PMBS@SC, volume 10724 of Lecture Notes in Computer Science, page 221-235. Springer, (2017)