Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory indexing: canonicalizing addresses across executions., and . SIGSOFT FSE, page 217-226. ACM, (2010)NACHOS: Software-Driven Hardware-Assisted Memory Disambiguation for Accelerators., , , and . HPCA, page 710-723. IEEE Computer Society, (2018)Comparative causality: explaining the differences between executions., and . ICSE, page 272-281. IEEE Computer Society, (2013)Reuse-oriented reverse engineering of functional components from x86 binaries., , , , and . ICSE, page 1128-1139. ACM, (2014)Precise calling context encoding., , , and . ICSE (1), page 525-534. ACM, (2010)Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs., , and . RV, volume 7186 of Lecture Notes in Computer Science, page 161-176. Springer, (2011)Selecting peers for execution comparison., , and . ISSTA, page 309-319. ACM, (2011)Bitwise Data Parallelism with LLVM: The ICgrep Case Study., , , , and . ICA3PP (2), volume 9529 of Lecture Notes in Computer Science, page 373-387. Springer, (2015)Algorithms for Automatically Computing the Causal Paths of Failures., and . FASE, volume 5503 of Lecture Notes in Computer Science, page 355-369. Springer, (2009)SPEC-AX and PARSEC-AX: extracting accelerator benchmarks from microprocessor benchmarks., , and . IISWC, page 117-127. IEEE Computer Society, (2016)