Author of the publication

Instruction Scheduling and Global Register Allocation for SIMD Multiprocessors.

, and . IRREGULAR, volume 980 of Lecture Notes in Computer Science, page 81-86. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global register allocation for SIMD multiprocessors., , and . J. Comput. Sci. Technol., 11 (3): 222-236 (1996)Instruction Scheduling and Global Register Allocation for SIMD Multiprocessors., and . IRREGULAR, volume 980 of Lecture Notes in Computer Science, page 81-86. Springer, (1995)Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes., , , , and . ACM Trans. Priv. Secur., 24 (1): 1:1-1:33 (2020)Invisible Backdoor Attacks Against Deep Neural Networks., , , , , and . CoRR, (2019)The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT., , , , , , , and . CoRR, (2019)DDoD: Dual Denial of Decision Attacks on Human-AI Teams., , , , , , , and . CoRR, (2022)Backdoors Against Natural Language Processing: A Review., , , , , and . IEEE Secur. Priv., 20 (5): 50-59 (2022)SoK: Use of Cryptography in Malware Obfuscation., , , , , , and . IACR Cryptol. ePrint Arch., (2022)POSTER: TouchTrack: How Unique are your Touch Gestures?, , , and . CCS, page 2555-2557. ACM, (2017)Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users., , , , , and . IEEE Big Data, page 3624-3633. IEEE, (2023)