Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Network Interfaces Less Peripheral., and . Computer, 31 (10): 70-76 (1998)A comparative study of arbitration algorithms for the Alpha 21364 pipelined router., , , , , and . ASPLOS, page 223-234. ACM Press, (2002)The Impact of Data Transfer and Buffering Alternatives on Network Interface Design., and . HPCA, page 207-218. IEEE Computer Society, (1998)Transient fault detection via simultaneous multithreading., and . ISCA, page 25-36. IEEE Computer Society, (2000)Exploiting Global Knowledge to Achieve Self-Tuned Congestion Control for k-Ary n-Cube Networks., , and . IEEE Trans. Parallel Distributed Syst., 15 (3): 257-272 (2004)Performance Simulation Tools., , , , and . Computer, 35 (2): 38-39 (2002)Cache Scrubbing in Microprocessors: Myth or Necessity?, , , and . PRDC, page 37-42. IEEE Computer Society, (2004)An evaluation of directory protocols for medium-scale shared-memory multiprocessors., and . International Conference on Supercomputing, page 64-74. ACM, (1994)Wisconsin Wind Tunnel II: a fast, portable parallel architecture simulator., , , , , , , and . IEEE Concurrency, 8 (4): 12-20 (2000)A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor., , , , and . MICRO, page 29-42. IEEE Computer Society, (2003)