Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Implementation of Retention in a Coroutine Environment., and . Acta Inf., (1983)Increasing Utilization in Modern Warehouse-Scale Computers Using Bubble-Up., , , , and . IEEE Micro, 32 (3): 88-99 (2012)The Contraction of Control Implementations., , and . Comput. Lang., 8 (1): 15-25 (1983)The Combining DAG: A Technique for Parallel Data Flow Analysis., , and . IEEE Trans. Parallel Distrib. Syst., 5 (8): 805-813 (1994)A Fine-Grained Approach to Scheduling Asynchronous Multiprocessors., , and . ICCI, page 139-142. IEEE Computer Society, (1992)Compile-Time Planning for Overhead Reduction in Software Dynamic Translators., , , , and . International Journal of Parallel Programming, 33 (2-3): 103-114 (2005)Introduction to the Special Section., , and . IEEE Trans. Software Eng., 21 (11): 881-882 (1995)Path Sensitive Analysis for Security Flaws.. HASE, page 3. IEEE Computer Society, (2008)Priority based data flow testing., and . ICSM, page 348-357. IEEE Computer Society, (1995)Overhead Reduction Techniques for Software Dynamic Translation., , , , and . IPDPS Next Generation Software Program - NSFNGS - PI Workshop, IEEE Computer Society, (2004)