Author of the publication

Breaking the boundary for whole-system performance optimization of big data.

, , , , , , , and . ISLPED, page 126-131. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thermal and competition aware mapping for 3D network-on-chip., , , , and . IEICE Electronic Express, 9 (19): 1510-1515 (2012)Perceived 3D TV Transmission Quality Assessment: Multi-Laboratory Results Using Absolute Category Rating on Quality of Experience Scale., , , , , and . TBC, 58 (4): 544-557 (2012)An energy- and buffer-aware fully adaptive routing algorithm for Network-on-Chip., , , and . Microelectronics Journal, 44 (2): 137-144 (2013)Joint optimisation for power control, scheduling and routing algorithms in the infrastructure wireless mesh network., , , and . IJAHUC, 3 (2): 122-131 (2008)Compiler and runtime techniques for software transactional memory optimization., , , , , , , , , and 5 other author(s). Concurrency and Computation: Practice and Experience, 21 (1): 7-23 (2009)Compressive network coding for error control in wireless sensor networks., , , and . Wireless Networks, 20 (8): 2605-2615 (2014)SIISAM: A Model for Secure Inhomogeneous Information Systems., , , , and . IEEE Computer, 41 (7): 56-61 (2008)New predictor-corrector methods of second-order for solving nonlinear equations., and . Int. J. Comput. Math., 88 (2): 296-313 (2011)Prediction of the Coal and Gas Outburst by Neural Network., , , , , and . ISCID (2), page 405-408. IEEE Computer Society, (2009)Blind Signature Scheme Based on Quartic Residues., , , and . INCoS, page 403-407. IEEE, (2013)