Author of the publication

On mitigating memory bandwidth contention through bandwidth-aware scheduling.

, , and . PACT, page 237-248. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Library Function Disposing Approach in Binary Translation., , , , and . J. Comput. Res. Dev., 43 (12): 2174-2179 (2006)SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks., , , , , , , , and . CoRR, (2021)FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods., , , , , , , , and . CoRR, (2022)Anna: A KVS for Any Scale., , , and . IEEE Trans. Knowl. Data Eng., 33 (2): 344-358 (2021)Making Information Hiding Effective Again., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2576-2594 (2022)CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation., , , , , , , and . CCS, page 2989-3002. ACM, (2022)Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths., , , , , , and . USENIX Security Symposium, page 4365-4382. USENIX Association, (2022)HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines., , , , , , , and . VEE, page 53-64. ACM, (2015)Memos: A full hierarchy hybrid memory management framework., , , , , and . ICCD, page 368-371. IEEE Computer Society, (2016)Localization of concurrency bugs using shared memory access pairs., , , , , , , , and . ASE, page 611-622. ACM, (2014)