Simha Sethumadhavan
Affiliations: | Computer Science | Columbia University, New York, NY |
Area:
Computer Architecture, Security, VLSI Design, High Performance ComputingGoogle:
"Simha Sethumadhavan"Children
Sign in to add traineeJohn Demme | grad student | 2014 | Columbia |
Adam Waksman | grad student | 2014 | Columbia |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Sethumadhavan S, Tiwari M. (2019) Secure Architectures Ieee Micro |
Tang A, Sethumadhavan S, Stolfo S. (2018) Motivating Security-Aware Energy Management Ieee Micro. 38: 98-106 |
Huang Y, Guo N, Seok M, et al. (2017) Analog Computing in a Modern Context: A Linear Algebra Accelerator Case Study Ieee Micro. 37: 30-38 |
Sasaki H, Su F, Tanimoto T, et al. (2017) Heavy Tails in Program Structure Ieee Computer Architecture Letters. 16: 34-37 |
Yuan X, Williams-King D, Yang J, et al. (2016) Making Lock-free Data Structures Verifiable with Artificial Transactions Operating Systems Review. 49: 57-63 |
Sethumadhavan S. (2016) Hardware-Enforced Privacy Ieee Computer. 49: 10-10 |
Olson LE, Sethumadhavan S, Hill MD. (2016) Security Implications of Third-Party Accelerators Ieee Computer Architecture Letters. 15: 50-53 |
Maycock M, Sethumadhavan S. (2016) Hardware Enforced Statistical Privacy Ieee Computer Architecture Letters. 15: 21-24 |
Oren Y, Kemerlis VP, Sethumadhavan S, et al. (2015) The spy in the sandbox: Practical cache attacks in JavaScript and their implications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1406-1418 |
Sethumadhavan S, Waksman A, Suozzo M, et al. (2015) Trustworthy hardware from untrusted components Communications of the Acm. 58: 60-71 |