Author of the publication

User-Level DMA without Operating System Kernel Modification.

, and . HPCA, page 322-331. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of a Reliable Remote Memory Pager., and . USENIX Annual Technical Conference, page 177-190. USENIX Association, (1996)A Systematic Characterization of IM Threats using Honeypots., , , and . NDSS, The Internet Society, (2010)RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage., , and . MASCOTS, page 101-110. IEEE Computer Society, (2010)Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection., , , , and . SEC, volume 181 of IFIP, page 393-408. Springer, (2005)Shared Memory vs. Message Passing in Shared-Memory Multiprocessors., and . SPDP, page 254-263. IEEE Computer Society, (1992)Regular Expression Matching on Graphics Hardware for Intrusion Detection., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 265-283. Springer, (2009)Incognitus: Privacy-Preserving User Interests in Online Social Networks., , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 81-95. Springer, (2018)Gnort: High Performance Network Intrusion Detection Using Graphics Processors., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 116-134. Springer, (2008)SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms., , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 197-212. Springer, (2011)The Remote Enqueue Operation on Networks of Workstations., , , and . Informatica (Slovenia), (1999)