Author of the publication

TALM: A Hybrid Execution Model with Distributed Speculation Support.

, , , and . SBAC-PAD (Workshops), page 31-36. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workshop 15: MPP Parallel Programming Models - Special Edition Machine Learning Performance and Security., , , and . IPDPS Workshops, page 838-839. IEEE, (2020)Hardening DNNs against Transfer Attacks during Network Compression using Greedy Adversarial Pruning., , and . AICAS, page 324-327. IEEE, (2022)Distributed Checkpointing in Dataflow with Static Scheduling.. SBAC-PADW, page 77-82. IEEE, (2023)Stack-Tagged Dataflow., , , , and . SBAC-PAD (Workshops), page 78-83. IEEE Computer Society, (2014)MLPrivacyGuard: Defeating Confidence Information based Model Inversion Attacks on Machine Learning Systems., , and . ACM Great Lakes Symposium on VLSI, page 411-415. ACM, (2019)Realizing strong PUF from weak PUF via neural computing., , , , , , and . DFT, page 1-6. IEEE Computer Society, (2017)Concurrency Analysis in Dynamic Dataflow Graphs., , , and . IEEE Trans. Emerg. Top. Comput., 9 (1): 44-54 (2021)Towards Adversarial Attack Resistant Deep Neural Networks., and . ESANN, page 49-54. (2020)Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network., , , , , , and . J. Hardw. Syst. Secur., 3 (3): 235-249 (2019)Graph Templates for Dataflow Programming., , , , and . SBAC-PAD (Workshops), page 91-96. IEEE Computer Society, (2015)