Author of the publication

On the Determination of Inlining Vectors for Program Optimization.

, , , , , and . CC, volume 7791 of Lecture Notes in Computer Science, page 164-183. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data., , , and . CF, page 3-13. ACM, (2019)Protecting the supply chain for automotives and IoTs., , and . DAC, page 89:1-89:4. ACM, (2018)Tolerating Defects in Low-Power Neural Network Accelerators Via Retraining-Free Weight Approximation., , , , and . ACM Trans. Embed. Comput. Syst., 20 (5s): 85:1-85:21 (2021)FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption., , , , , , , , , and . CoRR, (2023)PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data., , , and . ICCD, page 333-336. IEEE, (2019)Effective Evaluation of Multi-core Based Systems., , , and . ISPDC, page 19-25. IEEE, (2013)Pruning hardware evaluation space via correlation-driven application similarity analysis., , , , , and . Conf. Computing Frontiers, page 4. ACM, (2011)Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography., , , and . J. Signal Process. Syst., 93 (10): 1139-1148 (2021)Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols., , , and . IACR Cryptol. ePrint Arch., (2018)Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims., , , , , , , , , and 49 other author(s). CoRR, (2020)