Author of the publication

Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors.

, , and . DATE, page 1190-1195. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A proof method for the correctness of modularized 0CFA., , and . Inf. Process. Lett., 81 (4): 179-185 (2002)An Advanced Compiler Framework for Non-Cache-Coherent Multiprocessors., , , , and . IEEE Trans. Parallel Distributed Syst., 13 (3): 241-259 (2002)Compiling for Scalable Multiprocessors with Polaris., and . Parallel Process. Lett., 7 (4): 425-436 (1997)Fast Code Generation for Embedded Processors with Aliased Heterogeneous Registers., and . Trans. High Perform. Embed. Archit. Compil., (2009)Efficient dynamic information flow tracking on a processor with core debug interface., , , and . DAC, page 79:1-79:6. ACM, (2015)Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 20 (4): 53:1-53:32 (2015)An Efficient Management Technique for Fast SRAM Subsystems., , and . ICHIT (1), volume 7425 of Lecture Notes in Computer Science, page 412-419. Springer, (2012)A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications., , , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 694-698. Springer, (2016)Experience with a retargetable compiler for a commercial network processor., , , and . CASES, page 178-187. ACM, (2002)Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping., , , , , and . IEEE Trans. Dependable Secur. Comput., 14 (2): 145-157 (2017)