Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conflict Detection and Validation Strategies for Software Transactional Memory., , , and . DISC, volume 4167 of Lecture Notes in Computer Science, page 179-193. Springer, (2006)Solving the starting problem: device drivers as self-describing artifacts., , , , and . EuroSys, page 45-57. ACM, (2006)Privatization techniques for software transactional memory., , , and . PODC, page 338-339. ACM, (2007)Transaction Safe Nonblocking Data Structures., , and . DISC, volume 4731 of Lecture Notes in Computer Science, page 488-489. Springer, (2007)Extending Transactional Memory with Atomic Deferral., , and . OPODIS, volume 95 of LIPIcs, page 7:1-7:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Understanding and Improving Persistent Transactions on Optane™ DC Memory., , , and . IPDPS, page 348-357. IEEE, (2020)Case Study: Using Transactions in Memcached., , , and . Transactional Memory, volume 8913 of Lecture Notes in Computer Science, Springer, (2015)Exploiting Locality in Scalable Ordered Maps., , and . ICDCS, page 998-1008. IEEE, (2021)Reducing Memory Ordering Overheads in Software Transactional Memory., , , and . CGO, page 13-24. IEEE Computer Society, (2009)Implementing and Exploiting Inevitability in Software Transactional Memory., , , , and . ICPP, page 59-66. IEEE Computer Society, (2008)