Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak Memory Models with Matching Axiomatic and Operational Definitions., , , and . CoRR, (2017)Composable Building Blocks to Open Up Processor Design., , and . IEEE Micro, 39 (3): 47-55 (2019)Weak Memory Models: Balancing Definitional Simplicity and Implementation Flexibility., , and . PACT, page 288-302. IEEE Computer Society, (2017)An Operational Framework for Specifying Memory Models using Instantaneous Instruction Execution., , and . CoRR, (2017)Constructing a Weak Memory Model., , , , and . ISCA, page 124-137. IEEE Computer Society, (2018)Constructing and evaluating weak memory models.. Massachusetts Institute of Technology, Cambridge, USA, (2019)ndltd.org (oai:dspace.mit.edu:1721.1/122690).GraFBoost: Using Accelerated Flash Storage for External Graph Analytics., , , , and . ISCA, page 411-424. IEEE Computer Society, (2018)MI6: Secure Enclaves in a Speculative Out-of-Order Processor., , , , , and . MICRO, page 42-56. ACM, (2019)Proteus: Language and Runtime Support for Self-Adaptive Software Development., , , , , , , , , and 9 other author(s). IEEE Software, 36 (2): 73-82 (2019)MI6: Secure Enclaves in a Speculative Out-of-Order Processor., , , , , and . CoRR, (2018)