Author of the publication

MeToo: Stochastic Modeling of Memory Traffic Timing Behavior.

, , and . PACT, page 457-467. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliminating Conflict Misses Using Prime Number-Based Cache Indexing., , and . IEEE Trans. Computers, 54 (5): 573-586 (2005)Counter-Based Cache Replacement Algorithms., and . ICCD, page 61-68. IEEE Computer Society, (2005)MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging., , , and . HPCA, page 273-284. IEEE Computer Society, (2007)Scal-Tool: Pinpointing and Quantifying Scalability Bottlenecks in DSM Multiprocessors., , and . SC, page 17. ACM, (1999)Predicting Cache Space Contention in Utility Computing Servers., , and . IPDPS, IEEE Computer Society, (2005)TrojBits: A Hardware Aware Inference-Time Attack on Transformer-Based Language Models., , , and . ECAI, volume 372 of Frontiers in Artificial Intelligence and Applications, page 60-68. IOS Press, (2023)PSSM: achieving secure memory for GPUs with partitioned and sectored security metadata., , and . ICS, page 139-151. ACM, (2021)WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi Traffic., , , , and . CCNC, page 385-392. IEEE, (2022)SpecPMT: Speculative Logging for Resolving Crash Consistency Overhead of Persistent Memory., , , , , , and . ASPLOS (2), page 762-777. ACM, (2023)Adaptively Mapping Code in an Intelligent Memory Architecture., , and . Intelligent Memory Systems, volume 2107 of Lecture Notes in Computer Science, page 71-84. Springer, (2000)