1. Safer Program Behavior Sharing Through Trace Wringing;Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems;2019-04-04
2. Synthetic Data Generation;Data Privacy;2016-08-25
3. Workload Characterization;ACM Computing Surveys;2016-02-08
4. Accurate Cloning of the Memory Access Behavior;IPSJ Transactions on System LSI Design Methodology;2016
5. A tool for the generation of realistic network workload for emerging networking scenarios;Computer Networks;2012-10