Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Virtual Machine Monitor Intrusion Detection Using Feature Selection on Highly Imbalanced Data., , , , , and . ICMLA, page 823-827. IEEE Computer Society, (2010)Contrasting instruction-fetch time and instruction-decode time branch prediction mechanisms: Achieving synergy through their cooperative operation., , , and . Microprocessing and Microprogramming, 35 (1-5): 401-408 (1992)Profile-Guided Optimization of Critical Medical Imaging Algorithms., , , and . ISBI, page 1293-1293. IEEE, (2009)Multi GPU Implementation of Iterative Tomographic Reconstruction Algorithms., , , and . ISBI, page 185-188. IEEE, (2009)Improving the Accuracy of History Based Branch Prediction., and . IEEE Trans. Computers, 46 (4): 469-472 (1997)Unstructured Control Flow in GPGPU., and . IPDPS Workshops, page 1194-1202. IEEE, (2013)Fifth Annual Workshop on Computer Education., and . HPCA, page 320. IEEE Computer Society, (1999)Digital Computer Architecture.. The Computer Science and Engineering Handbook, CRC Press, (1997)Improving Multiprocessor Scalability Using Lockup Free Caches., , and . PDPTA, page 619-622. CSREA Press, (1996)Hardware thread reordering to boost OpenCL throughput on FPGAs., , , and . ICCD, page 257-264. IEEE Computer Society, (2016)