Search the dblp DataBase
Dirk Grunwald :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dirk Grunwald , Donald C. Lindsay , Benjamin G. Zorn Static Methods in Hybrid Branch Prediction. [Citation Graph (0, 0)][DBLP ] IEEE PACT, 1998, pp:222-229 [Conf ] Artur Klauser , Todd M. Austin , Dirk Grunwald , Brad Calder Dynamic Hammock Predication for Non-Predicated Instruction Set Architectures. [Citation Graph (0, 0)][DBLP ] IEEE PACT, 1998, pp:278-285 [Conf ] Srilatha Manne , Artur Klauser , Dirk Grunwald Branch Prediction Using Selective Branch Inversion. [Citation Graph (0, 0)][DBLP ] IEEE PACT, 1999, pp:48-56 [Conf ] Robert Cooksey , Stéphan Jourdan , Dirk Grunwald A stateless, content-directed data prefetching mechanism. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2002, pp:279-290 [Conf ] Dirk Grunwald , Richard Neves Whole-Program Optimization for Time and Space Efficient Threads. [Citation Graph (0, 0)][DBLP ] ASPLOS, 1996, pp:50-59 [Conf ] Brad Calder , Dirk Grunwald Reducing Branch Costs via Branch Alignment. [Citation Graph (0, 0)][DBLP ] ASPLOS, 1994, pp:242-251 [Conf ] Joseph Dunn , Michael Neufeld , Anmol Sheth , Dirk Grunwald , John K. Bennett A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks. [Citation Graph (0, 0)][DBLP ] BROADNETS, 2004, pp:355-364 [Conf ] Michael Neufeld , Dirk Grunwald Using Phase Array Antennas with the 802.11 MAC Protocol. [Citation Graph (0, 0)][DBLP ] BROADNETS, 2004, pp:733-735 [Conf ] Tipp Moseley , Alex Shye , Vijay Janapa Reddi , Matthew Iyer , Dan Fay , David Hodgdon , Joshua L. Kihm , Alex Settle , Dirk Grunwald , Daniel A. Connors Dynamic run-time architecture techniques for enabling continuous optimization. [Citation Graph (0, 0)][DBLP ] Conf. Computing Frontiers, 2005, pp:211-220 [Conf ] Tipp Moseley , Daniel A. Connors , Dirk Grunwald , Ramesh Peri Identifying potential parallelism via loop-centric profiling. [Citation Graph (0, 0)][DBLP ] Conf. Computing Frontiers, 2007, pp:143-152 [Conf ] Tipp Moseley , Alex Shye , Vijay Janapa Reddi , Dirk Grunwald , Ramesh Peri Shadow Profiling: Hiding Instrumentation Costs with Parallelism. [Citation Graph (0, 0)][DBLP ] CGO, 2007, pp:198-208 [Conf ] Srilatha Manne , Dirk Grunwald , Fabio Somenzi Remembrance of Things Past: Locality and Memory in BDDs. [Citation Graph (0, 0)][DBLP ] DAC, 1997, pp:196-201 [Conf ] Graham Schelle , Dirk Grunwald CUSP: a modular framework for high speed network applications on FPGAs. [Citation Graph (0, 0)][DBLP ] FPGA, 2005, pp:246-257 [Conf ] Graham Schelle , Dirk Grunwald Automated Speculation and Parallelism in High Performance Network Applications. [Citation Graph (0, 0)][DBLP ] FPL, 2004, pp:1175- [Conf ] Clive F. Baillie , Dirk Grunwald , Suvas Vajracharya Application of an Object-Oriented Parallel Run-Time System to a Grand Challenge 3D Multi-Grid Code. [Citation Graph (0, 0)][DBLP ] HICSS (1), 1996, pp:251-260 [Conf ] Marco Gruteser , Graham Schelle , Ashish Jain , Richard Han , Dirk Grunwald Privacy-Aware Location Sensor Networks. [Citation Graph (0, 0)][DBLP ] HotOS, 2003, pp:163-168 [Conf ] Brad Calder , Dirk Grunwald , Joel S. Emer Predictive Sequential Associative Cache. [Citation Graph (0, 0)][DBLP ] HPCA, 1996, pp:244-253 [Conf ] Anshu Aggarwal , Dirk Grunwald Effects of Network Bandwidth on Performance in Software DSM Systems. [Citation Graph (0, 0)][DBLP ] HPCN Europe, 1998, pp:638-647 [Conf ] Tipp Moseley , Dirk Grunwald , Joshua L. Kihm , Daniel A. Connors Methods for Modeling Resource Contention on Simultaneous Multithreading Processors. [Citation Graph (0, 0)][DBLP ] ICCD, 2005, pp:373-380 [Conf ] Dirk Grunwald Data Dependence Analysis: The Lambda Test Revisited. [Citation Graph (0, 0)][DBLP ] ICPP (2), 1990, pp:220-223 [Conf ] James M. Purtilo , Daniel A. Reed , Dirk Grunwald Environments for Prototyping Parallel Algorithms. [Citation Graph (0, 0)][DBLP ] ICPP, 1987, pp:431-438 [Conf ] Suvas Vajracharya , Dirk Grunwald Dependence Driven Execution for Multiprogrammed Multiprocessor. [Citation Graph (0, 0)][DBLP ] International Conference on Supercomputing, 1998, pp:329-336 [Conf ] Robert Cooksey , Dennis Colarelli , Dirk Grunwald Content-Based Prefetching: Initial Results. [Citation Graph (0, 0)][DBLP ] Intelligent Memory Systems, 2000, pp:33-55 [Conf ] Dirk Grunwald , Suvas Vajracharya Efficient Barriers for Distributed Shared Memory Computers. [Citation Graph (0, 0)][DBLP ] IPPS, 1994, pp:604-608 [Conf ] Brad Calder , Dirk Grunwald Fast and Accurate Instruction Fetch and Branch Prediction. [Citation Graph (0, 0)][DBLP ] ISCA, 1994, pp:2-11 [Conf ] Brad Calder , Dirk Grunwald Next Cache Line and Set Prediction. [Citation Graph (0, 0)][DBLP ] ISCA, 1995, pp:287-296 [Conf ] E. Chow , H. Madan , J. Peterson , Dirk Grunwald , Daniel A. Reed Hyperswitch Network for the Hypercube Computer. [Citation Graph (0, 0)][DBLP ] ISCA, 1988, pp:90-99 [Conf ] Dirk Grunwald , Artur Klauser , Srilatha Manne , Andrew R. Pleszkun Confidence Estimation for Speculation Control. [Citation Graph (0, 0)][DBLP ] ISCA, 1998, pp:122-131 [Conf ] Doug Joseph , Dirk Grunwald Prefetching Using Markov Predictors. [Citation Graph (0, 0)][DBLP ] ISCA, 1997, pp:252-263 [Conf ] Artur Klauser , Abhijit Paithankar , Dirk Grunwald Selective Eager Execution on the PolyPath Architecture. [Citation Graph (0, 0)][DBLP ] ISCA, 1998, pp:250-259 [Conf ] Srilatha Manne , Artur Klauser , Dirk Grunwald Pipeline Gating: Speculation Control for Energy Reduction. [Citation Graph (0, 0)][DBLP ] ISCA, 1998, pp:132-141 [Conf ] Dennis Lee , Jean-Loup Baer , Brad Calder , Dirk Grunwald Instruction Cache Fetch Policies for Speculative Execution. [Citation Graph (0, 0)][DBLP ] ISCA, 1995, pp:357-367 [Conf ] Dirk Grunwald , Harini Srinivasan Efficient Computation of Precedence Information in Parallel Programs. [Citation Graph (0, 0)][DBLP ] LCPC, 1993, pp:602-616 [Conf ] Suvas Vajracharya , Dirk Grunwald Dependence Driven Execution for Data Parallelism. [Citation Graph (0, 0)][DBLP ] LCPC, 1996, pp:570-584 [Conf ] Dirk Grunwald , Gary J. Nutt , Anthony M. Sloane , David Wagner , Benjamin G. Zorn A Testbed for Studying Parallel Programs and Parallel Execution Architectures. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1993, pp:95-106 [Conf ] Brad Calder , Dirk Grunwald , Joel S. Emer A system level perspective on branch architecture performance. [Citation Graph (0, 0)][DBLP ] MICRO, 1995, pp:199-206 [Conf ] Brad Calder , Dirk Grunwald , Amitabh Srivastava The predictability of branches in libraries. [Citation Graph (0, 0)][DBLP ] MICRO, 1995, pp:24-34 [Conf ] Dirk Grunwald , Soraya Ghiasi Microarchitectural denial of service: insuring microarchitectural fairness. [Citation Graph (0, 0)][DBLP ] MICRO, 2002, pp:409-418 [Conf ] Artur Klauser , Dirk Grunwald Instruction Fetch Mechanisms for Multipath Execution Processors. [Citation Graph (0, 0)][DBLP ] MICRO, 1999, pp:38-0 [Conf ] Marco Gruteser , Dirk Grunwald Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. [Citation Graph (0, 0)][DBLP ] MobiSys, 2003, pp:- [Conf ] Anmol Sheth , Christian Doerr , Dirk Grunwald , Richard Han , Douglas Sicker MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. [Citation Graph (0, 0)][DBLP ] MobiSys, 2006, pp:191-204 [Conf ] Stephen Aiken , Dirk Grunwald , Andrew R. Pleszkun , Jesse Willek A Performance Analysis of the iSCSI Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Mass Storage Systems, 2003, pp:123-134 [Conf ] Charles B. Morrey III , Dirk Grunwald Peabody: The Time Travelling Disk. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Mass Storage Systems, 2003, pp:241-253 [Conf ] Michael Neufeld , Ashish Jain , Dirk Grunwald Nsclick: : bridging network simulation and deployment. [Citation Graph (0, 0)][DBLP ] MSWiM, 2002, pp:74-81 [Conf ] Dirk Grunwald , Philip Levis , Keith I. Farkas , Charles B. Morrey III , Michael Neufeld Policies for Dynamic Clock Scheduling. [Citation Graph (0, 0)][DBLP ] OSDI, 2000, pp:73-86 [Conf ] Soraya Ghiasi , Dirk Grunwald A Comparison of Two Architectural Power Models. [Citation Graph (0, 0)][DBLP ] PACS, 2000, pp:137-152 [Conf ] Suvas Vajracharya , Dirk Grunwald Exploiting Temporal Locality Using a Dependence Driven Execution. [Citation Graph (0, 0)][DBLP ] PDPTA, 1997, pp:275-284 [Conf ] Brad Calder , Dirk Grunwald , Donald C. Lindsay , James H. Martin , Michael Mozer , Benjamin G. Zorn Corpus-Based Static Branch Prediction. [Citation Graph (0, 0)][DBLP ] PLDI, 1995, pp:79-92 [Conf ] Dirk Grunwald , Benjamin G. Zorn , Robert Henderson Improving the Cache Locality of Memory Allocation. [Citation Graph (0, 0)][DBLP ] PLDI, 1993, pp:177-186 [Conf ] Brad Calder , Dirk Grunwald Reducing Indirect Function call Overhead in C++ Programs. [Citation Graph (0, 0)][DBLP ] POPL, 1994, pp:397-408 [Conf ] Dirk Grunwald , Harini Srinivasan Data Flow Equations for Explicitly Parallel Programs. [Citation Graph (0, 0)][DBLP ] PPOPP, 1993, pp:159-168 [Conf ] Dennis Colarelli , Dirk Grunwald Massive arrays of idle disks for storage archives. [Citation Graph (0, 0)][DBLP ] SC, 2002, pp:1-11 [Conf ] Keith I. Farkas , Jason Flinn , Godmar Back , Dirk Grunwald , Jennifer-Ann M. Anderson Quantifying the energy consumption of a pocket computer and a Java virtual machine. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2000, pp:252-263 [Conf ] Carlos Maltzahn , Kathy J. Richardson , Dirk Grunwald Performance Issues of Enterprise Level Web Proxies. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1997, pp:13-23 [Conf ] Marco Gruteser , Dirk Grunwald A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:10-24 [Conf ] Carlos Maltzahn , Kathy J. Richardson , Dirk Grunwald Reducing the Disk I/O of Web Proxy Server Caches. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 1999, pp:225-238 [Conf ] Nels Anderson , Adam Bender , Carl Hartung , Gaurav Kulkarni , Anuradha Kumar , Isaac Sanders , Dirk Grunwald , Bruce Sanders The Design of the Mirage Spatial Wiki. [Citation Graph (0, 0)][DBLP ] WEBIST, 2005, pp:48-55 [Conf ] Marco Gruteser , Dirk Grunwald Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. [Citation Graph (0, 0)][DBLP ] WMASH, 2003, pp:46-55 [Conf ] Dirk Grunwald Embedded, General-Purpose, and High-Performance Systems. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:29- [Journal ] Artur Klauser , Srilatha Manne , Dirk Grunwald Selective Branch Inversion: Confidence Estimation for Branch Predictors. [Citation Graph (0, 0)][DBLP ] International Journal of Parallel Programming, 2001, v:29, n:1, pp:81-110 [Journal ] James M. Purtilo , Daniel A. Reed , Dirk Grunwald Environments for Prototyping Parallel Algorithms. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1988, v:5, n:4, pp:421-437 [Journal ] Joseph Dunn , Michael Neufeld , Anmol Sheth , Dirk Grunwald , John K. Bennett A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks. [Citation Graph (0, 0)][DBLP ] MONET, 2006, v:11, n:1, pp:37-45 [Journal ] Marco Gruteser , Dirk Grunwald Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. [Citation Graph (0, 0)][DBLP ] MONET, 2005, v:10, n:3, pp:315-325 [Journal ] Dirk Grunwald Book Review: Distributed Applications Across DCE and Windows NT by Ward Rosenberry and Jim Teague. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1996, v:30, n:2, pp:2- [Journal ] Benjamin G. Zorn , Dirk Grunwald Empirical Measurements of Six Allocation-intensive C Programs. [Citation Graph (0, 0)][DBLP ] SIGPLAN Notices, 1992, v:27, n:12, pp:71-80 [Journal ] Dirk Grunwald , Benjamin G. Zorn CustoMalloc: Efficient Synthesized Memory Allocators. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1993, v:23, n:8, pp:851-869 [Journal ] Doug Joseph , Dirk Grunwald Prefetching Using Markov Predictors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1999, v:48, n:2, pp:121-133 [Journal ] Benjamin G. Zorn , Dirk Grunwald Evaluating Models of Memory Allocation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Model. Comput. Simul., 1994, v:4, n:1, pp:107-131 [Journal ] Brad Calder , Dirk Grunwald , Michael P. Jones , Donald C. Lindsay , James H. Martin , Michael Mozer , Benjamin G. Zorn Evidence-Based Static Branch Prediction Using Machine Learning. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1997, v:19, n:1, pp:188-222 [Journal ] Michael Neufeld , Ashish Jain , Dirk Grunwald Network Protocol Development with nsclick. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2004, v:10, n:5, pp:569-581 [Journal ] Chainsaw: Using Binary Matching for Relative Instruction Mix Comparison. [Citation Graph (, )][DBLP ] A platform for developing adaptable multicore applications. [Citation Graph (, )][DBLP ] OptiScope: Performance Accountability for Optimizing Compilers. [Citation Graph (, )][DBLP ] XML-basierte dreidimensionale Animation von Algorithmen und Datenstrukturen. [Citation Graph (, )][DBLP ] Abstracting Modern FCCMs To Provide a Single Interface to Architectural Resources. [Citation Graph (, )][DBLP ] A Software Defined Radio Application Utilizing Modern FPGAs and NoC Interconnects. [Citation Graph (, )][DBLP ] Exploring FPGA network on chip implementations across various application and network loads. [Citation Graph (, )][DBLP ] Low-Latency Multichannel Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Legal issues surrounding monitoring during network research. [Citation Graph (, )][DBLP ] PHY Aided MAC - A New Paradigm. [Citation Graph (, )][DBLP ] STORM: Simple Tool for Resource Management. [Citation Graph (, )][DBLP ] Applying models of user activity for dynamic power management in wireless devices. [Citation Graph (, )][DBLP ] Physical Layer Attacks on Unlinkability in Wireless LANs. [Citation Graph (, )][DBLP ] Shining Light in Dark Places: Understanding the Tor Network. [Citation Graph (, )][DBLP ] SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks. [Citation Graph (, )][DBLP ] Modeling directionality in wireless networks: extended abstract. [Citation Graph (, )][DBLP ] Performing traffic analysis on a wireless identifier-free link layer. [Citation Graph (, )][DBLP ] Low-resource routing attacks against tor. [Citation Graph (, )][DBLP ] Enhancing Cognitive Radio Algorithms Through Efficient, Automatic Adaptation Management. [Citation Graph (, )][DBLP ] Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Predicting Tor path compromise by exit port. [Citation Graph (, )][DBLP ] Experiences Implementing Cognitive Radio Control Algorithms. [Citation Graph (, )][DBLP ] Dynamic Control Channel Assignment in Cognitive Radio Networks Using Swarm Intelligence. [Citation Graph (, )][DBLP ] The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can. [Citation Graph (, )][DBLP ] A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. [Citation Graph (, )][DBLP ] Multichannel Wormhole Switching vs. CSMA/CA for Wireless Mesh Networking. [Citation Graph (, )][DBLP ] An intelligent physical layer for cognitive radio networks. [Citation Graph (, )][DBLP ] Robust Coverage and Performance Testing for Large-Area Wireless Networks. [Citation Graph (, )][DBLP ] Local control of cognitive radio networks. [Citation Graph (, )][DBLP ] Wireless innovation through software radios. [Citation Graph (, )][DBLP ] Search in 0.015secs, Finished in 0.468secs