Author:
Luk Chi-Keung,Cohn Robert,Muth Robert,Patil Harish,Klauser Artur,Lowney Geoff,Wallace Steven,Reddi Vijay Janapa,Hazelwood Kim
Cited by
937 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding Silent Data Corruption in Processors for Mitigating its Effects;ACM Transactions on Architecture and Code Optimization;2024-09-02
2. Dapper: A Lightweight and Extensible Framework for Live Program State Rewriting;2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS);2024-07-23
3. HADES: Hardware-Assisted Distributed Transactions in the Age of Fast Networks and SmartNICs;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
4. Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
5. EPIC: Efficient and Proactive Instruction-level Cyberdefense;Proceedings of the Great Lakes Symposium on VLSI 2024;2024-06-12