Sanjeev Kumar

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Transparent Epidermal Antenna for Unobtrusive Human-Centric Internet of Things Applications.
IEEE Internet Things J., January, 2024

Development of a novel wrist pulse system for early diagnosis of pathogenic bacterial infections using optimized feature selection with machine learning approaches.
Biomed. Signal Process. Control., January, 2024

2023
Non-overlapping block-level difference-based image forgery detection and localization (NB-localization).
Vis. Comput., December, 2023

Intelligent personalised learning system based on emotions in e-learning.
Pers. Ubiquitous Comput., December, 2023

Enhancing surface quality of SLM produced AlSi10Mg components through chemical polishing.
Int. J. Syst. Assur. Eng. Manag., October, 2023

SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification.
Appl. Soft Comput., October, 2023

Discrete-time prediction based event-triggered controller design: An application to networked multi-area power system with time delays.
IFAC J. Syst. Control., September, 2023

Comparative qualitative analysis and numerical solution of conformable fractional derivative generalized KdV-mKdV equation.
Int. J. Syst. Assur. Eng. Manag., August, 2023

Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing.
Wirel. Networks, July, 2023

A hybrid C-GSA optimization routing algorithm for energy-efficient wireless sensor network.
Wirel. Networks, July, 2023

A comparative study on facial expression recognition using local binary patterns, convolutional neural network and frequency neural network.
Multim. Tools Appl., July, 2023

Design of Compact Textile MIMO with High Isolation for Wearable Applications.
Wirel. Pers. Commun., 2023

Multi-modality medical image fusion based on guided filter and image statistics in multidirectional shearlet transform domain.
J. Ambient Intell. Humaniz. Comput., 2023

Diabetes prediction using optimisation techniques with machine learning algorithms.
Int. J. Electron. Heal., 2023

Integrated e-healthcare management system using machine learning and flask.
Int. J. Electron. Heal., 2023

Blockchain Payment Services in the Hospitality Sector: The Mediating Role of Data Security on Utilisation Efficiency of the Customer.
Data, 2023

On a factorization result of Ştefănescu - II.
CoRR, 2023

Mimetic Muscle Rehabilitation Analysis Using Clustering of Low Dimensional 3D Kinect Data.
CoRR, 2023

Robust Cross Directional Controller Design for Paper Machine Spatial Distributed System.
IEEE Access, 2023

Experimental Evaluation of Smart Electric Meters' Resilience Under Cyber Security Attacks.
IEEE Access, 2023

SDN-based Intelligent Honeynet Architecture for Averting Attacks.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

A Scientific Study for Breast Cancer Detection Using Various Machine Learning Algorithms.
Proceedings of the Advances in Computing and Data Sciences - 7th International Conference, 2023

Cyber Security Flood Attacks and Risk Assessment for Internet of Things (IoT) Distributed Systems.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

2022
A comprehensive survey on meta-heuristic-based energy minimization routing techniques for wireless sensor network: classification and challenges.
J. Supercomput., 2022

Mathematical modelling and performance analysis of screening unit in paper plant.
Int. J. Syst. Assur. Eng. Manag., 2022

A spider tool-based qualitative analysis of machine learning for wrist pulse analysis.
Netw. Model. Anal. Health Informatics Bioinform., 2022

VI-NET: A hybrid deep convolutional neural network using VGG and inception V3 model for copy-move forgery classification.
J. Vis. Commun. Image Represent., 2022

Principal component analysis technique for early fault detection.
J. Intell. Fuzzy Syst., 2022

An efficient high order iterative scheme for large nonlinear systems with dynamics.
J. Comput. Appl. Math., 2022

DTMIC: Deep transfer learning for malware image classification.
J. Inf. Secur. Appl., 2022

A tri-band triangular lamp post shaped quad port MIMO antenna.
Int. J. Commun. Syst., 2022

A comparative study and implementation of neuro-fuzzy and decision tree for malignant tumour detection system.
Int. J. Adv. Intell. Paradigms, 2022

Identification of malware families using stacking of textural features and machine learning.
Expert Syst. Appl., 2022

A multi-modality paradigm for CT and MRI fusion with applications of quantum image processing.
Concurr. Comput. Pract. Exp., 2022

An efficient matrix iteration family for finding the generalized outer inverse.
Appl. Math. Comput., 2022

Wireless Smart Electric Meter Operation under Data Security Attacks.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Victim Aware AP-PF CoMP Clustering for Resource Allocation in Ultra-Dense Heterogeneous Small-Cell Networks.
Wirel. Pers. Commun., 2021

Defected Ground Split Ring Resonator-Based Sensor for Adulteration Detection in Fluids.
Wirel. Pers. Commun., 2021

Mediating Role of Demographic Variables in the Relationship between Talent Development Practices and Employees' Performance.
Webology, 2021

A Novel Approach for the Snow Water Equivalent Retrieval Using X-Band Polarimetric Synthetic Aperture Radar Data.
IEEE Trans. Geosci. Remote. Sens., 2021

A Smart Archive Box for Museum Artifact Monitoring Using Battery-Less Temperature and Humidity Sensing.
Sensors, 2021

Design of adaptive ensemble classifier for online sentiment analysis and opinion mining.
PeerJ Comput. Sci., 2021

Stochastic modelling and performance analysis of feeding unit in paper plant.
Int. J. Math. Oper. Res., 2021

Comparative radio-frequency and crosstalk analysis of carbon-based nano-interconnects.
IET Circuits Devices Syst., 2021

A review and analysis of secure and lightweight ECC-based RFID authentication protocol for Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2021

Diagnosing Web Data of ICTs to Provide Focused Assistance in Agricultural Adoptions.
CoRR, 2021

Distinguishing malicious programs based on visualization and hybrid learning algorithms.
Comput. Networks, 2021

Biospeckle-Based Sensor for Characterization of Charcoal Rot (Macrophomina Phaseolina (Tassi) Goid) Disease in Soybean (Glycine Max (L.) Merr.) Crop.
IEEE Access, 2021

Wideband Circularly Polarized Textile MIMO Antenna for Wearable Applications.
IEEE Access, 2021

A Museum Artefact Monitoring Testbed using LoRaWAN.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Performance Analysis of Resource Scheduling Techniques in Homogeneous and Heterogeneous Small Cell LTE-A Networks.
Wirel. Pers. Commun., 2020

Filter Bank Multicarrier Modulation Schemes for Visible Light Communication.
Wirel. Pers. Commun., 2020

Covert communication integrates into wavelet packet transform OFDM system over Rayleigh fading channel.
Wirel. Networks, 2020

A Feature Extraction Method Using Linear Model Identification of Voltammetric Electronic Tongue.
IEEE Trans. Instrum. Meas., 2020

Compressive Holography From Poisson Noise Plagued Holograms Using Expectation-Maximization.
IEEE Trans. Computational Imaging, 2020

A Generalization of Bevelacqua's Irreducibility Criterion.
Am. Math. Mon., 2020

A Wristwatch-Based Wireless Sensor Platform for IoT Health Monitoring Applications.
Sensors, 2020

Enhanced vascular and osseous information fusion: disagreement of quantitative and qualitative analysis.
Neural Comput. Appl., 2020

Exploiting WiMAX for covert transmission of secret data over fading channel.
Int. J. Commun. Syst., 2020

PSO-MoSR: a PSO-based multi-objective software remodularisation.
Int. J. Bio Inspired Comput., 2020

Mat_peptide: comprehensive annotation of mature peptides from polyproteins in five virus families.
Bioinform., 2020

Snow Characterization and Avalanche Detection in the Indian Himalaya.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2020

Evaluation of CentOS performance under IoT based DDoS Security Attacks.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

Effect of Intermediate Network Systems on Remote Power Data Collection in Smart Grid.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

A Fast Implementation of the Rijndael Substitution Box for Cryptographic AES.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

2019
A Comprehensive Survey of Visible Light Communication: Potential and Challenges.
Wirel. Pers. Commun., 2019

Statistical Analysis of Lower and Raised Pitch Voice Signal and Its Efficiency Calculation.
Traitement du Signal, 2019

Fast and memory efficient approach for mapping NGS reads to a reference genome.
J. Bioinform. Comput. Biol., 2019

Parameter Estimation of Randles Model of Electronic Tongue Using System Identification.
Proceedings of the IEEE International Symposium on Olfaction and Electronic Nose, 2019

Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Improved Mix Column Computation of Cryptographic AES.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Handoff Prioritization to Manage Call Admission Control in Mobile Multimedia Networks for Healthcare.
Proceedings of the 10th International Conference on Computing, 2019

2018
Covert information sharing with novel fuzzy adaptive edge detection.
Secur. Priv., 2018

How Client Capabilities, Vendor Configuration, and Location Impact BPO Outcomes.
J. Comput. Inf. Syst., 2018

WBFQC: A new approach for compressing next-generation sequencing data splitting into homogeneous streams.
J. Bioinform. Comput. Biol., 2018

Providing Software as a Service: a design decision(s) model.
Inf. Syst. E Bus. Manag., 2018

Characterizing ISI and sub-threshold membrane potential distributions: Ensemble of IF neurons with random squared-noise intensity.
Biosyst., 2018

Development of Electronic Interface for Sensing Applications with Voltammetric Electronic Tongue.
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018

A New Approach of Modeling the Electronic Tongue Sensors for Classification.
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018

Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Snowpack Density Retrieval Using Fully Polarimetric TerraSAR-X Data in the Himalayas.
IEEE Trans. Geosci. Remote. Sens., 2017

Availability analysis and performance optimization of a butter oil production system: a case study.
Int. J. Syst. Assur. Eng. Manag., 2017

Mathematical modeling and reliability analysis of the serial processes in feeding system of a sugar plant.
Int. J. Syst. Assur. Eng. Manag., 2017

Performance modeling of the serial processes in refining system of a sugar plant using RAMD analysis.
Int. J. Syst. Assur. Eng. Manag., 2017

Influenza Research Database: An integrated bioinformatics resource for influenza virus research.
Nucleic Acids Res., 2017

Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network.
J. Inf. Process. Syst., 2017

Application of MADM Methods for Selecting the Best Private Institution for Professional Courses in Uttarakhand State, India.
Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering (RICE 2017), 2017

Classification of Brain MRI Tumor Images: A Hybrid Approach.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017

2016
Mathematical modeling and fuzzy availability analysis of skim milk powder system of a dairy plant.
Int. J. Syst. Assur. Eng. Manag., 2016

Dynamo: Facebook's Data Center-Wide Power Management System.
Proceedings of the 43rd ACM/IEEE Annual International Symposium on Computer Architecture, 2016

Analysis of Angle Based Opportunistic Routing Protocol for Vehicular Ad-Hoc Networks.
ICTCS, 2016

Flash storage disaggregation.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

2015
Existential consistency: measuring and understanding consistency at Facebook.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

A Large-Scale Study of Flash Memory Failures in the Field.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015


Generation of Power Law: Maximum Entropy Framework and Superstatistics.
Proceedings of the Man-Machine Interactions 4, 2015

Low power analog VLSI implementation of cortical neuron with threshold modulation.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Low power amplifier for biopotential signal acquisition system.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Challenges to Adopting Stronger Consistency at Scale.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Leveraging Contextual Inquiry Methods to Empower Patients in a Learning Health System.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Using Social Network Analysis to Inform Management of Open Source Software Development.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

RIPQ: Advanced Photo Caching on Flash for Facebook.
Proceedings of the 13th USENIX Conference on File and Storage Technologies, 2015

Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Implementation of motion transfer in robotic surgery.
Int. J. Medical Eng. Informatics, 2014

f4: Facebook's Warm BLOB Storage System.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2013
Joint Effect of Team Structure and Software Architecture in Open Source Software Development.
IEEE Trans. Engineering Management, 2013

Nepenthes Honeypots based Botnet Detection
CoRR, 2013

An analysis of Facebook photo caching.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

Non-convex P-Norm Projection for Robust Sparsity.
Proceedings of the IEEE International Conference on Computer Vision, 2013

2012
A parallel simulator for network terminal packet buffer.
Simul., 2012

ViPR: an open bioinformatics database and analysis resource for virology research.
Nucleic Acids Res., 2012

Design of an assistive anaesthesia drug delivery control using knowledge based systems.
Knowl. Based Syst., 2012

Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks.
J. Information Security, 2012

Higuchi fractal dimension as a measure of analgesia.
Int. J. Medical Eng. Informatics, 2012

Extraction of best set of parameters derived from electroencephalogram for the prediction of awake and sleeps state of the patient.
Int. J. Medical Eng. Informatics, 2012

Changes in electroencephalogram pattern by ice cube cold pressor stimulus.
Int. J. Medical Eng. Informatics, 2012

Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks.
IEEE Secur. Priv., 2012

On some modified families of multipoint iterative methods for multiple roots of nonlinear equations.
Appl. Math. Comput., 2012

Analyzing the Facebook workload.
Proceedings of the 2012 IEEE International Symposium on Workload Characterization, 2012

Content directed enhancement of degraded document images.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

Information Sharing Beyond Firm Boundaries: A Taxonomy and Research Framework.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
DeFT: Design space exploration for on-the-fly detection of coherence misses.
ACM Trans. Archit. Code Optim., 2011

TCP SYN-based DDoS attack on EKG signals monitored via a wireless sensor network.
Secur. Commun. Networks, 2011

Effectiveness of Built-in Security Protection of Microsoft's Windows Server 2003 against TCP SYN Based DDoS Attacks.
J. Information Security, 2011

McAfee SecurityCenter Evaluation under DDoS Attack Traffic.
J. Information Security, 2011

Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks.
J. Information Security, 2011

Apple's Leopard Versus Microsoft's Windows XP: Experimental Evaluation of Apple's Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks.
Inf. Secur. J. A Glob. Perspect., 2011

Geometrically Constructed Families of Newton's Method for Unconstrained Optimization and Nonlinear Equations.
Int. J. Math. Math. Sci., 2011

A Fuzzy Particle Swarm Optimization for Solving the Economic Dispatch Problem.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

System Identification of Single Machine Infinite Bus Using GA-Fuzzy Technique.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

Cost, Quality and Time Outcomes of Onshore and Offshore Business Process Outsourcing.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Antecedents and Effect of IT Usage on Performance: A Research Framework and Empirical Study.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment.
J. Information Security, 2010

Comparison of Memory Assignment Schemes for Switch Architectures with Shareable Parallel Memory Modules.
J. Electr. Comput. Eng., 2010

Mathematical formulation for the second derivative of backpropagation error with non-linear output function in feedforward neural networks.
Int. J. Inf. Decis. Sci., 2010

L1 Projections with Box Constraints
CoRR, 2010

Finding a Needle in Haystack: Facebook's Photo Storage.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Is McAfee SecurityCenter/Firewall Software Providing Complete Security for Your Computer?.
Proceedings of the Fourth International Conference on Digital Society, 2010

Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack.
Proceedings of the Fourth International Conference on Digital Society, 2010

Financial forecasting using generalized neural method.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
Security Challenges in Multihop Wireless Mesh Networks-A Survey.
Proceedings of the Information Security and Digital Forensics, 2009

Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks.
Proceedings of the Information Security and Digital Forensics, 2009

An Information Model for Process Control on Machine Tools.
Proceedings of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology, 2009

Empirical Analysis of Antecedents of Perceived Customer Satisfaction with Linux.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Efficient implementation of sorting on multi-core SIMD CPU architecture.
Proc. VLDB Endow., 2008

Convergence of Recognition, Mining, and Synthesis Workloads and Its Implications.
Proc. IEEE, 2008

Improved and generalized learning strategies for dynamically fast and statistically robust evolutionary algorithms.
Eng. Appl. Artif. Intell., 2008

Second Life and the New Generation of Virtual Worlds.
Computer, 2008

Atomic Vector Operations on Chip Multiprocessors.
Proceedings of the 35th International Symposium on Computer Architecture (ISCA 2008), 2008

PARSEC vs. SPLASH-2: A quantitative comparison of two multithreaded benchmark suites on Chip-Multiprocessors.
Proceedings of the 4th International Symposium on Workload Characterization (IISWC 2008), 2008

Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

The PARSEC benchmark suite: characterization and architectural implications.
Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, 2008

2007
Editorial introduction to the special issue on developmental systems.
Genet. Program. Evolvable Mach., 2007

Prediction of flow stress for carbon steels using recurrent self-organizing neuro fuzzy networks.
Expert Syst. Appl., 2007

Reports on the 2006 AAAI Fall Symposia.
AI Mag., 2007

Carbon: architectural support for fine-grained parallelism on chip multiprocessors.
Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), 2007

Physical simulation for animation and visual effects: parallelization and characterization for chip multiprocessors.
Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), 2007

SOA and Information Sharing in Supply Chain: 'How' Information is Shared Matters!
Proceedings of the International Conference on Information Systems, 2007

Does SOA Improve the Supply Chain? An Empirical Analysis of the Impact of SOA Adoption on Electronic Supply Chain Performance.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Impact of Service-Oriented Architecture Adoption on Electronic Supply Chain Performance.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Bank of One: Empirical Analysis of Peer-to-Peer Financial Marketplaces.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Solving Part-Type Selection and Operation Allocation Problems in an FMS: An Approach Using Constraints-Based Fast Simulated Annealing Algorithm.
IEEE Trans. Syst. Man Cybern. Part A, 2006

PING attack - How bad is it?
Comput. Secur., 2006

Hybrid transactional memory.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2006

Metrics to Support Open Source Software Adoption Decisions.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks?
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

A Novel Developmental System for the Study of Evolutionary Design.
Proceedings of the Developmental Systems, 2006

2005
Performance comparison of switch architectures with shareable parallel memory modules.
IEEE Commun. Lett., 2005

Effect of Unbalanced Bursty Traffic on Memory-Sharing Schemes for Internet Switching Architecture.
Proceedings of the Networking, 2005

Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm.
Proceedings of the Networking, 2005

The art of nature: evolving mechanisms of development for self-organization and differentiation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

2004
Performance-Directed Energy Management for Storage Systems.
IEEE Micro, 2004

Memory-bandwidth performance of the sliding-window based routers/switches.
Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks, 2004

A multimodal learning interface for sketch, speak and point creation of a schedule chart.
Proceedings of the 6th International Conference on Multimodal Interfaces, 2004

Dynamic tracking of page miss ratio curve for memory management.
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, 2004

Performance directed energy management for main memory and disks.
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, 2004

Fast Paths in Concurrent Programs.
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques (PACT 2004), 29 September, 2004

2003
The sliding-window packet switch: a new class of packet switch architecture with plural memory modules and decentralized control.
IEEE J. Sel. Areas Commun., 2003

Compilation, Architectural Support, and Evaluation of SIMD Graphics Pipeline Programs on a General-Purpose CPU.
Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques (PACT 2003), 27 September, 2003

2002
Using Model Checking to Debug Device Firmware.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Dynamic memory management for programmable devices.
Proceedings of The Workshop on Memory Systems Performance (MSP 2002), 2002

2001
ESP: A Language for Programmable Devices.
Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2001

1999
Evaluating Synchronization on Shared Address Space Multiprocessors: Methodology and Performance.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Application scaling under shared virtual memory on a cluster of SMPs.
Proceedings of the 13th international conference on Supercomputing, 1999

1998
Threads Yield Continuations.
LISP Symb. Comput., 1998

Exploiting Spatial Locality in Data Caches Using Spatial Footprints.
Proceedings of the 25th Annual International Symposium on Computer Architecture, 1998

1997
Bringing objects to the mainstream.
Proceedings of the Proceedings IEEE COMPCON 97, 1997

1987
Retrospection on the Compiler Structure.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1987

1986
Automatic Retargetable Code Generation: A New Technique.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1986


  Loading...