Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design methodology for a modular service-driven network processor architecture., , , , , and . Computer Networks, 41 (5): 623-640 (2003)On instruction set generation for specialized processors.. ETH Zurich, (2006)Classification of thread profiles for scaling application behavior., , , and . Parallel Computing, (2017)Predicting Cloud Performance for HPC Applications: a User-oriented Approach., , , and . CCGrid, page 524-533. IEEE Computer Society / ACM, (2017)Analytic processor model for fast design-space exploration., , , , , and . ICCD, page 411-414. IEEE Computer Society, (2015)Scaling application properties to exascale., , , and . Conf. Computing Frontiers, page 31:1-31:8. ACM, (2015)Robust header compression (ROHC) in next-generation network processors., , , and . IEEE/ACM Trans. Netw., 13 (4): 755-768 (2005)Holistic power analysis of implementation alternatives for a very large scale synthesis array with phased array stations., , , , and . ICASSP, page 5397-5401. IEEE, (2014)An instrumentation approach for hardware-agnostic software characterization., , , , and . Conf. Computing Frontiers, page 3:1-3:8. ACM, (2015)Simplified Authentication and Authorization for RESTful Services in Trusted Environments., , and . ESOCC, volume 7592 of Lecture Notes in Computer Science, page 244-258. Springer, (2012)