Author of the publication

TAP prediction: Reusing conditional branch predictor for indirect branches with Target Address Pointers.

, , , , , and . ICCD, page 119-126. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

S/DC: A storage and energy efficient data prefetcher., , , , , and . DATE, page 461-466. IEEE, (2012)SOLE: Speculative one-cycle load execution with scalability, high-performance and energy-efficiency., , , , and . ICCD, page 291-296. IEEE Computer Society, (2012)TAP prediction: Reusing conditional branch predictor for indirect branches with Target Address Pointers., , , , , and . ICCD, page 119-126. IEEE Computer Society, (2011)A history-based matching approach to identification of framework evolution., , , and . ICSE, page 353-363. IEEE Computer Society, (2012)Locating need-to-translate constant strings for software internationalization., , , , and . ICSE, page 353-363. IEEE, (2009)Preface., , , , , , and . J. Comput. Sci. Technol., 32 (6): 1057-1059 (2017)Conditional Dyck-CFL Reachability Analysis for Complete and Efficient Library Summarization., , , , , and . ESOP, volume 10201 of Lecture Notes in Computer Science, page 880-908. Springer, (2017)PerfRanker: prioritization of performance regression tests for collection-intensive software., , and . ISSTA, page 23-34. ACM, (2017)Automatic Building of Java Projects in Software Repositories: A Study on Feasibility and Challenges., , , and . ESEM, page 38-47. IEEE Computer Society, (2017)Toward a framework for detecting privacy policy violations in android application code., , , , , , , and . ICSE, page 25-36. ACM, (2016)