From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions., , , и . IEEE Comput. Archit. Lett., 20 (2): 162-165 (2021)Understanding Selective Delay as a Method for Efficient Secure Speculative Execution., , , , и . IEEE Trans. Computers, 69 (11): 1584-1595 (2020)Evaluating the Potential Applications of Quaternary Logic for Approximate Computing., , , и . ACM J. Emerg. Technol. Comput. Syst., 16 (1): 5:1-5:25 (2020)Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks., , и . CoRR, (2021)Maximizing Limited Resources: a Limit-Based Study and Taxonomy of Out-of-Order Commit., , , и . J. Signal Process. Syst., 91 (3-4): 379-397 (2019)Where replacement algorithms fail: a thorough analysis., , и . Conf. Computing Frontiers, стр. 141-150. ACM, (2010)Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power., , , и . PACS, том 2008 из Lecture Notes in Computer Science, стр. 82-96. Springer, (2000)TCP: Tag Correlating Prefetchers., , и . HPCA, стр. 317-326. IEEE Computer Society, (2003)Dynamically Disabling Way-prediction to Reduce Instruction Replay., , и . ICCD, стр. 140-143. IEEE Computer Society, (2018)POSTER: Efficient Self-Invalidation/Self-Downgrade for Critical Sections with Relaxed Semantics., , , и . PACT, стр. 433-434. ACM, (2016)