Author of the publication

Pruning hardware evaluation space via correlation-driven application similarity analysis.

, , , , , and . Conf. Computing Frontiers, page 4. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R-Kleene: A High-Performance Divide-and-Conquer Algorithm for the All-Pair Shortest Path for Densely Connected Networks., and . Algorithmica, 47 (2): 203-213 (2007)xDNN: Inference for Deep Convolutional Neural Networks., , , , , and . ACM Trans. Reconfigurable Technol. Syst., 15 (2): 18:1-18:29 (2022)Fractal Matrix Multiplication: A Case Study on Portability of Cache Performance., , and . WAE, volume 2141 of Lecture Notes in Computer Science, page 26-38. Springer, (2001)Adaptive Strassen's matrix multiplication., and . ICS, page 284-292. ACM, (2007)Binary and Polytomous Responses Modeling: Multiple-Campaign Ad-Targeting Without Personal User Information.. CoRR, (2015)On the Space and Access Complexity of Computation DAGs., , and . WG, volume 1928 of Lecture Notes in Computer Science, page 47-58. Springer, (2000)JuliusC: A Practical Approach for the Analysis of Divide-and-Conquer Algorithms., and . LCPC, volume 3602 of Lecture Notes in Computer Science, page 117-131. Springer, (2004)Entropy Maximization in Sparse Matrix by Vector Multiplication (maxESpMV)., , , , and . CoRR, (2023)Non-parametric Information-Theoretic Measures of One-Dimensional Distribution Functions from Continuous Time Series., and . SDM, page 685-696. SIAM, (2009)A Data Cache with Dynamic Mapping., , and . LCPC, volume 2958 of Lecture Notes in Computer Science, page 436-450. Springer, (2003)