Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Basic Gamification Techniques to IT Compliance Training: Evidence from the Lab and Field., , and . J. Information Systems, 30 (3): 119-133 (2016)Decoupled Compressed Cache: Exploiting Spatial Locality for Energy Optimization., and . IEEE Micro, 34 (3): 91-99 (2014)Token Coherence: A New Framework for Shared-Memory Multiprocessors., , and . IEEE Micro, 23 (6): 108-116 (2003)21st Century Computer Architecture., , , , , , , , , and . CoRR, (2016)The Journal of Information Systems 2015 Conference on Information Technology Audit., and . J. Information Systems, 30 (1): 3-5 (2016)Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system., , and . Int. J. Crit. Infrastructure Prot., (2020)Specifying and Verifying a Broadcast and a Multicast Snooping Cache Coherence Protocol., , , , , and . IEEE Trans. Parallel Distributed Syst., 13 (6): 556-578 (2002)gem5-gpu: A Heterogeneous CPU-GPU Simulator., , , , and . IEEE Comput. Archit. Lett., 14 (1): 34-36 (2015)Weekly carbon dioxide exchange trend predictions in deciduous broadleaf forests from site-specific influencing variables.. Ecol. Informatics, (July 2023)Fourier Neural Operator for Fluid Flow in Small-Shape 2D Simulated Porous Media Dataset., , , , and . Algorithms, 16 (1): 24 (January 2023)