Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using JIT Compilation and Configurable Runtime Systems for Efficient Deployment of Java Programs on Ubiquitous Devices., and . UbiComp, volume 2201 of Lecture Notes in Computer Science, page 76-95. Springer, (2001)C-Graph: A Highly Efficient Concurrent Graph Reachability Query Framework., , , and . ICPP, page 79:1-79:10. ACM, (2018)Commentary: When the brain takes a break: a model-based analysis of mind wandering., and . Frontiers Comput. Neurosci., (2015)Special Issue on Top Picks From the 2021 Computer Architecture Conferences., and . IEEE Micro, 42 (4): 6-9 (2022)DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning., , , and . CoRR, (2022)One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation., , , and . USENIX Security Symposium, page 19-35. USENIX Association, (2016)SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities., , and . NDSS, The Internet Society, (2020)Mitigating Parameter Variation with Dynamic Fine-Grain Body Biasing., , , and . MICRO, page 27-42. IEEE Computer Society, (2007)A Fused Inference Design for Pattern-Based Sparse CNN on Edge Devices., , and . HiPC, page 424-429. IEEE, (2021)Fused DSConv: Optimizing Sparse CNN Inference for Execution on Edge Devices., , and . CCGRID, page 545-554. IEEE, (2021)