Author of the publication

An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.

, , , , , and . ICAC, page 263-273. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of compressed instruction sets on workloads targeted at mobile internet devices., , , and . SoCC, page 215-218. IEEE, (2009)Performance analysis of NVMe SSDs and their implication on real world databases., , , , , , , and . SYSTOR, page 6:1-6:11. ACM, (2015)Reducing energy of virtual cache synonym lookup using bloom filters., , , , and . CASES, page 179-189. ACM, (2006)Way guard: a segmented counting bloom filter approach to reducing energy for set-associative caches., , , , and . ISLPED, page 165-170. ACM, (2009)System-Level Characterization of Datacenter Applications., , , , , and . ICPE, page 27-38. ACM, (2015)Performance Characterization of Hyperscale Applicationson on NVMe SSDs., , , , , , , and . SIGMETRICS, page 473-474. ACM, (2015)Towards GPU Memory Efficiency for Distributed Training at Scale., , , , , , and . SoCC, page 281-297. ACM, (2023)A Fresh Perspective on Total Cost of Ownership Models for Flash Storage in Datacenters., , , and . CloudCom, page 245-252. IEEE Computer Society, (2016)Efficient System-on-Chip Energy Management with a Segmented Bloom Filter., , , and . ARCS, volume 3894 of Lecture Notes in Computer Science, page 283-297. Springer, (2006)A structured approach to the simulation, analysis and characterization of smartphone applications., , , , , , and . IISWC, page 113-122. IEEE Computer Society, (2013)