Author of the publication

A Study of Three Dynamic Approaches to Handle Widely Shared Data in Shared-memory Multiprocessors.

, , and . International Conference on Supercomputing, page 457-464. ACM, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where replacement algorithms fail: a thorough analysis., , and . Conf. Computing Frontiers, page 141-150. ACM, (2010)Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power., , , and . PACS, volume 2008 of Lecture Notes in Computer Science, page 82-96. Springer, (2000)Maximizing Limited Resources: a Limit-Based Study and Taxonomy of Out-of-Order Commit., , , and . J. Signal Process. Syst., 91 (3-4): 379-397 (2019)Understanding Selective Delay as a Method for Efficient Secure Speculative Execution., , , , and . IEEE Trans. Computers, 69 (11): 1584-1595 (2020)Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks., , and . CoRR, (2021)Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions., , , and . IEEE Comput. Archit. Lett., 20 (2): 162-165 (2021)Evaluating the Potential Applications of Quaternary Logic for Approximate Computing., , , and . ACM J. Emerg. Technol. Comput. Syst., 16 (1): 5:1-5:25 (2020)Splash-4: A Modern Benchmark Suite with Lock-Free Constructs., , , and . IISWC, page 51-64. IEEE, (2022)DataScalar Architectures., , and . ISCA, page 338-349. ACM, (1997)Doppelganger Loads: A Safe, Complexity-Effective Optimization for Secure Speculation Schemes., , , and . ISCA, page 53:1-53:13. ACM, (2023)