Author:
Eeckhout L.,de Bosschere K.,Neefs H.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces;ACM Transactions on Architecture and Code Optimization;2024-05-21
2. Sieve: Stratified GPU-Compute Workload Sampling;2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS);2023-04
3. Analysis of wireless network access logs for a hierarchical characterization of user mobility;Journal of King Saud University - Computer and Information Sciences;2022-06
4. Context-Aware Privacy-Optimizing Address Tracing;2021 International Symposium on Secure and Private Execution Environment Design (SEED);2021-09
5. Machine Learning–enabled Scalable Performance Prediction of Scientific Codes;ACM Transactions on Modeling and Computer Simulation;2021-04-30