Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing Utilization in Modern Warehouse-Scale Computers Using Bubble-Up., , , , and . IEEE Micro, 32 (3): 88-99 (2012)The Contraction of Control Implementations., , and . Comput. Lang., 8 (1): 15-25 (1983)The Implementation of Retention in a Coroutine Environment., and . Acta Inf., (1983)The Combining DAG: A Technique for Parallel Data Flow Analysis., , and . IEEE Trans. Parallel Distrib. Syst., 5 (8): 805-813 (1994)Introduction to the Special Section., , and . IEEE Trans. Software Eng., 21 (11): 881-882 (1995)Compile-Time Planning for Overhead Reduction in Software Dynamic Translators., , , , and . International Journal of Parallel Programming, 33 (2-3): 103-114 (2005)A Methodology for Controlling the Size of a Test Suite., , and . ACM Trans. Softw. Eng. Methodol., 2 (3): 270-285 (1993)A Fine-Grained Approach to Scheduling Asynchronous Multiprocessors., , and . ICCI, page 139-142. IEEE Computer Society, (1992)Path Sensitive Analysis for Security Flaws.. HASE, page 3. IEEE Computer Society, (2008)Priority based data flow testing., and . ICSM, page 348-357. IEEE Computer Society, (1995)