Search for persons
X
?
Proceedings of the 2016 International Conference on Parallel Architectures and Compilation ,
1
EXCITE-VM : Extending the Virtual Memory System to Suppo..:
, In:
?
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems ,
2
SI-TM : reducing transactional memory abort rates throug..:
, In:
?
Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems ,
3
HICAMP : architectural support for efficient concurrency..:
, In:
?
Proceedings of the 26th ACM international conference on Supercomputing ,
4
Sparse matrix-vector multiply on the HICAMP architecture:
, In:
?
Proceedings of the second USENIX symposium on Operating systems design and implementation ,
5
The synergy between non-blocking synchronization and operat..:
, In:
?
Proceedings of the 1985 ACM thirteenth annual conference on Computer Science ,
6
Performance of the V storage server : a preliminary repo..:
, In:
?
Proceedings of the Tenth International Workshop on Data Management on New Hardware ,
8
HICAMP bitmap : space-efficient updatable bitmap index f..:
, In:
?
Proceedings of the 28th ACM International Conference on Design of Communication ,
9
Toward an ontology of rhetorical figures:
, In:
?
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007 ,
10
Comparing the performance of web server architectures:
, In:
?
Proceedings of the 1st international workshop on System evaluation for mobile platforms ,
11
Determining precise distance in a highly mobile environment..:
, In:
?
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining ,
12
Information distance from a question to an answer:
, In:
?
Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval ,
13
On-line spam filter fusion:
, In:
?
Proceedings of the 5th ACM workshop on Wireless security ,
14
Detecting identity-based attacks in wireless networks using..:
, In:
?
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture ,
15