Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data sharing in multi-threaded applications and its impact on chip design., , and . ISPASS, page 125-134. IEEE Computer Society, (2012)XAMP: An eXtensible Analytical Model Platform., and . ISPASS, page 13-23. IEEE Computer Society, (2013)Evaluating Dynamics and Bottlenecks of Memory Collaboration in Cluster Systems., , , , , , and . CCGRID, page 107-114. IEEE Computer Society, (2012)QoS policies and architecture for cache/memory in CMP platforms., , , , , , , , and . SIGMETRICS, page 25-36. ACM, (2007)Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization., , , and . USENIX Security Symposium, page 1257-1272. USENIX Association, (2019)Animations of important concepts in parallel computer architecture., , and . WCAE, page 23-29. ACM, (2007)Scheduling Page Table Walks for Irregular GPU Applications., , , , , , and . ISCA, page 180-192. IEEE Computer Society, (2018)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , and . ASPLOS, page 263-276. ACM, (2016)Efficient Checkpointing of Loop-Based Codes for Non-volatile Main Memory., , , and . PACT, page 318-329. IEEE Computer Society, (2017)MEMST: Cloning Memory Behavior using Stochastic Traces., and . MEMSYS, page 146-157. ACM, (2015)