Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Narayanasamy, Satish
add a person with the name Narayanasamy, Satish
 

Other publications of authors with the same name

A Safety-First Approach to Memory Models., , , , and . IEEE Micro, 33 (3): 96-104 (2013)Language-level persistency., , , , , , and . ISCA, page 481-493. ACM, (2017)Bounds Checking with Taint-Based Analysis., , , and . HiPEAC, volume 4367 of Lecture Notes in Computer Science, page 71-86. Springer, (2007)LiteRace: effective sampling for lightweight data-race detection., , and . PLDI, page 134-143. ACM, (2009)Tolerating Concurrency Bugs Using Transactions as Lifeguards., and . MICRO, page 263-274. IEEE Computer Society, (2010)BugNet: Continuously Recording Program Execution for Deterministic Replay Debugging., , and . ISCA, page 284-295. IEEE Computer Society, (2005)Using web corpus statistics for program analysis., , and . OOPSLA, page 49-65. ACM, (2014)zFENCE: Data-less Coherence for Efficient Fences., , and . ICS, page 295-305. ACM, (2015)Respec: efficient online multiprocessor replayvia speculation and external determinism., , , , , and . ASPLOS, page 77-90. ACM, (2010)Unbounded page-based transactional memory., , , , , , , and . ASPLOS, page 347-358. ACM, (2006)