Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Counter-Based Cache Replacement and Bypassing Algorithms., and . IEEE Trans. Computers, 57 (4): 433-447 (2008)Data sharing in multi-threaded applications and its impact on chip design., , and . ISPASS, page 125-134. IEEE Computer Society, (2012)XAMP: An eXtensible Analytical Model Platform., and . ISPASS, page 13-23. IEEE Computer Society, (2013)Evaluating placement policies for managing capacity sharing in CMP architectures with private caches., , and . TACO, 8 (3): 15:1-15:23 (2011)Efficient Checkpointing with Recompute Scheme for Non-volatile Main Memory., , , , , and . TACO, 16 (2): 18:1-18:27 (2019)Evaluating Dynamics and Bottlenecks of Memory Collaboration in Cluster Systems., , , , , , and . CCGRID, page 107-114. IEEE Computer Society, (2012)Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization., , , and . USENIX Security Symposium, page 1257-1272. USENIX Association, (2019)QoS policies and architecture for cache/memory in CMP platforms., , , , , , , , and . SIGMETRICS, page 25-36. ACM, (2007)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , and . ASPLOS, page 263-276. ACM, (2016)Efficient Checkpointing of Loop-Based Codes for Non-volatile Main Memory., , , and . PACT, page 318-329. IEEE Computer Society, (2017)