Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Global Knowledge to Achieve Self-Tuned Congestion Control for k-Ary n-Cube Networks., , and . IEEE Trans. Parallel Distrib. Syst., 15 (3): 257-272 (2004)Performance Simulation Tools., , , , and . IEEE Computer, 35 (2): 38-39 (2002)Computing Architectural Vulnerability Factors for Address-Based Structures., , , , , and . ISCA, page 532-543. IEEE Computer Society, (2005)Cache Scrubbing in Microprocessors: Myth or Necessity?, , , and . PRDC, page 37-42. IEEE Computer Society, (2004)Detailed Design and Evaluation of Redundant Multithreading Alternatives., , and . ISCA, page 99-110. IEEE Computer Society, (2002)BLAM : A High-Performance Routing Algorithm for Virtual Cut-Through Networks., , and . IPDPS, page 45. IEEE Computer Society, (2003)A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor., , , , and . MICRO, page 29-42. IEEE Computer Society, (2003)Wisconsin Wind Tunnel II: a fast, portable parallel architecture simulator., , , , , , , and . IEEE Concurrency, 8 (4): 12-20 (2000)An evaluation of directory protocols for medium-scale shared-memory multiprocessors., and . International Conference on Supercomputing, page 64-74. ACM, (1994)Making Network Interfaces Less Peripheral., and . IEEE Computer, 31 (10): 70-76 (1998)