Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DLL-conscious instruction fetch optimization for SMT processors., , and . Journal of Systems Architecture - Embedded Systems Design, 54 (12): 1089-1100 (2008)An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors., , , and . ISCA, page 102-113. IEEE Computer Society, (2006)High Efficiency Counter Mode Security Architecture via Prediction and Precomputation., , , , and . ISCA, page 14-24. IEEE Computer Society, (2005)Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems., , , and . IEEE PACT, page 123-134. IEEE Computer Society, (2004)Performance Characterization of Hyperscale Applicationson on NVMe SSDs., , , , , , , and . SIGMETRICS, page 473-474. ACM, (2015)A Fresh Perspective on Total Cost of Ownership Models for Flash Storage in Datacenters., , , and . CloudCom, page 245-252. IEEE Computer Society, (2016)Virtual Exclusion: An architectural approach to reducing leakage energy in caches for multiprocessor systems., and . ICPADS, page 1-8. IEEE Computer Society, (2007)A structured approach to the simulation, analysis and characterization of smartphone applications., , , , , , and . IISWC, page 113-122. IEEE Computer Society, (2013)Towards the issues in architectural support for protection of software execution., , , and . SIGARCH Computer Architecture News, 33 (1): 6-15 (2005)Efficient System-on-Chip Energy Management with a Segmented Bloom Filter., , , and . ARCS, volume 3894 of Lecture Notes in Computer Science, page 283-297. Springer, (2006)