Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards providing middleware-level proactive resource reorganisation for elastic HPC applications in the cloud., , , , , and . Int. J. Grid Util. Comput., 10 (1): 76-92 (2019)Comparison of Different Adaptable Cache Bypassing Approaches., , and . SBESC, page 1-8. IEEE, (2022)Using Memory Access Traces to Map Threads and Data on Hierarchical Multi-core Platforms., , , , , and . IPDPS Workshops, page 551-558. IEEE, (2011)An Elastic Multi-Core Allocation Mechanism for Database Systems., , , and . ICDE, page 473-484. IEEE Computer Society, (2018)Evaluating Cache Line Behavior Predictors for Energy Efficient Processors., , and . WSCAD (Selected Papers), volume 1171 of Communications in Computer and Information Science, page 185-197. Springer, (2018)Trace-driven and processing time extensions for Noxim simulator., , and . Des. Autom. Embed. Syst., 23 (1-2): 41-55 (2019)Memory-aware Thread and Data Mapping for Hierarchical Multi-core Platforms., , , , , and . Int. J. Netw. Comput., 2 (1): 97-116 (2012)Efficient Prequential AUC-PR Computation., , , and . ICMLA, page 2222-2227. IEEE, (2023)HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection., , , and . Expert Syst. Appl., (2022)AntiViruses under the microscope: A hands-on perspective., , , , , , and . Comput. Secur., (2022)