Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Address-Correlated Prefetching Practical., , , , and . IEEE Micro, 30 (1): 50-59 (2010)Scale-out processors, , , , , , , , , and . volume 40 of 3, IEEE Computer Society, (2012)Waverunner: An Elegant Approach to Hardware Acceleration of State Machine Replication., , , , , and . NSDI, page 357-374. USENIX Association, (2023)AppBastion: Protection from Untrusted Apps and OSes on ARM., , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 692-715. Springer, (2022)Scale-out processors., , , , , , , , , and 1 other author(s). ISCA, page 500-511. IEEE Computer Society, (2012)Maximizing CNN Accelerator Efficiency Through Resource Partitioning., , and . CoRR, (2016)Swarm model checking on the GPU., , , and . Int. J. Softw. Tools Technol. Transf., 22 (5): 583-599 (2020)Quantifying the Mismatch between Emerging Scale-Out Applications and Modern Processors., , , , , , , , , and . ACM Trans. Comput. Syst., 30 (4): 15:1-15:24 (2012)Last-Touch Correlated Data Streaming., and . ISPASS, page 105-115. IEEE Computer Society, (2007)Temporal streams in commercial server applications., , , , and . IISWC, page 99-108. IEEE Computer Society, (2008)