Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review of DISC 2011., and . SIGACT News, 42 (4): 87-91 (2011)From bounded to unbounded concurrency objects and back., , and . PODC, page 119-128. ACM, (2011)CBTree: A Practical Concurrent Self-Adjusting Search Tree., , , , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 1-15. Springer, (2012)Speculative Interference Attacks: Breaking Invisible Speculation Schemes., , , , , , , , , and 6 other author(s). CoRR, (2020)Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data., , , , , and . IEEE Micro, 40 (3): 81-90 (2020)Cache index-aware memory allocation., , and . ISMM, page 55-64. ACM, (2011)A Heap-Based Concurrent Priority Queue with Mutable Priorities for Faster Parallel Algorithms., , and . OPODIS, volume 46 of LIPIcs, page 15:1-15:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Speculative interference attacks: breaking invisible speculation schemes., , , , , , , , , and 6 other author(s). ASPLOS, page 1046-1060. ACM, (2021)System-level crash safe sorting on persistent memory., , , , , and . SYSTOR, page 151. ACM, (2022)Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing., and . SOSP, page 147-162. ACM, (2021)