Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architectural Support for Containment-based Security., , , , , , , and . ASPLOS, page 361-377. ACM, (2019)Edge-centric modulo scheduling for coarse-grained reconfigurable architectures., , , , , and . PACT, page 166-176. ACM, (2008)A survey of the practice of computational science, , , , , , , , , and 4 other author(s). State of the Practice Reports on - SC \textquotesingle11, ACM Press, (2011)Conversion of reference C code to dataflow model: H.264 encoder case study., , , and . ASP-DAC, page 152-157. IEEE, (2006)Parallelism orchestration using DoPE: the degree of parallelism executive., , , , and . PLDI, page 26-37. ACM, (2011)Practical automatic loop specialization., , , , and . ASPLOS, page 419-430. ACM, (2013)DynaSpAM: dynamic spatial architecture mapping using out of order instruction schedules., , , , and . ISCA, page 541-553. ACM, (2015)Recurrence cycle aware modulo scheduling for coarse-grained reconfigurable architectures., , , and . LCTES, page 21-30. ACM, (2009)Communication Architecture Simulation on the Virtual Synchronization Framework., , and . SAMOS, volume 4599 of Lecture Notes in Computer Science, page 3-12. Springer, (2007)Fast condensation of the program dependence graph., , , and . PLDI, page 39-50. ACM, (2013)