Christos Kozyrakis

Results: 38



#Item
31Dune: Safe User-level Access to Privileged CPU Features Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi`eres, Christos Kozyrakis Stanford University Abstract

Dune: Safe User-level Access to Privileged CPU Features Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi`eres, Christos Kozyrakis Stanford University Abstract

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-09-19 00:15:36
32Heuristics for Profile-driven Method-level Speculative Parallelization John Whaley and Christos Kozyrakis Computer Systems Laboratory Stanford University {jwhaley,kozyraki}@stanford.edu

Heuristics for Profile-driven Method-level Speculative Parallelization John Whaley and Christos Kozyrakis Computer Systems Laboratory Stanford University {jwhaley,kozyraki}@stanford.edu

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-04-01 19:35:00
33Welcome to Hot Chips 24 Christos Kozyrakis & Rumi Zahir Program Committee Co-Chairs Program Committee •

Welcome to Hot Chips 24 Christos Kozyrakis & Rumi Zahir Program Committee Co-Chairs Program Committee •

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-28 00:23:59
34Towards Energy Proportionality for Large-Scale Latency-Critical Workloads David Lo† , Liqun Cheng‡ , Rama Govindaraju‡ , Luiz André Barroso‡ and Christos Kozyrakis† Stanford University† Google, Inc.‡ Abstr

Towards Energy Proportionality for Large-Scale Latency-Critical Workloads David Lo† , Liqun Cheng‡ , Rama Govindaraju‡ , Luiz André Barroso‡ and Christos Kozyrakis† Stanford University† Google, Inc.‡ Abstr

Add to Reading List

Source URL: csl.stanford.edu

Language: English - Date: 2014-10-23 13:17:41
35Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-10-09 13:10:59
36Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael Dalton, Christos Kozyrakis, and Nickolai Zeldovich Computer Systems Laboratory CSAIL Stanford University

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael Dalton, Christos Kozyrakis, and Nickolai Zeldovich Computer Systems Laboratory CSAIL Stanford University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
37Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
38Identifying Energy Waste through Dense Power Sensing and Utilization Monitoring Maria Kazandjieva, Omprakash Gnawali, Brandon Heller, Philip Levis, and Christos Kozyrakis Computer Science Lab, Stanford University mariaka

Identifying Energy Waste through Dense Power Sensing and Utilization Monitoring Maria Kazandjieva, Omprakash Gnawali, Brandon Heller, Philip Levis, and Christos Kozyrakis Computer Science Lab, Stanford University mariaka

Add to Reading List

Source URL: hci.stanford.edu

Language: English - Date: 2010-08-28 17:00:27