Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-volatile memory host controller interface performance analysis in high-performance I/O systems., , and . ISPASS, page 145-154. IEEE Computer Society, (2015)Persistently-Secure Processors: Challenges and Opportunities for Securing Non-Volatile Memories., , , , and . ISVLSI, page 610-614. IEEE, (2019)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , and . ASPLOS, page 263-276. ACM, (2016)Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories., , and . MICRO, page 403-415. IEEE Computer Society, (2018)Diligent TLBs: a mechanism for exploiting heterogeneity in TLB miss behavior., , , and . ICS, page 195-205. ACM, (2019)HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication., , , , and . FPGA, page 52. ACM, (2022)Investigating Fairness in Disaggregated Non-Volatile Memories., , , and . ISVLSI, page 104-110. IEEE, (2019)Write-Aware Management of NVM-based Memory Extensions., , and . ICS, page 9:1-9:12. ACM, (2016)STM: Cloning the spatial and temporal memory access behavior., and . HPCA, page 237-247. IEEE Computer Society, (2014)Page migration support for disaggregated non-volatile memories., , , , and . MEMSYS, page 417-427. ACM, (2019)