default search action
Reena Panda
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j2]Jiajun Wang, Reena Panda, Lizy K. John:
SelSMaP: A Selective Stride Masking Prefetching Scheme. ACM Trans. Archit. Code Optim. 15(4): 42:1-42:21 (2019) - 2018
- [c20]Wooseok Lee, Reena Panda, Dam Sunwoo, José A. Joao, Andreas Gerstlauer, Lizy K. John:
BUQS: Battery- and user-aware QoS scaling for interactive mobile devices. ASP-DAC 2018: 64-69 - [c19]Reena Panda, Xinnian Zheng, Andreas Gerstlauer, Lizy Kurian John:
CAMP: Accurate modeling of core and memory locality for proxy generation of big-data applications. DATE 2018: 337-342 - [c18]Reena Panda, Shuang Song, Joseph Dean, Lizy K. John:
Wait of a Decade: Did SPEC CPU 2017 Broaden the Performance Horizon? HPCA 2018: 271-282 - [c17]Reena Panda, Lizy K. John:
HALO: A Hierarchical Memory Access Locality Modeling Technique For Memory System Explorations. ICS 2018: 118-128 - 2017
- [c16]Reena Panda, Lizy Kurian John:
Proxy Benchmarks for Emerging Big-Data Workloads. PACT 2017: 105-116 - [c15]Reena Panda, Xinnian Zheng, Jiajun Wang, Andreas Gerstlauer, Lizy K. John:
Statistical Pattern Based Modeling of GPU Memory Access Streams. DAC 2017: 81:1-81:6 - [c14]Jiajun Wang, Reena Panda, Lizy Kurian John:
SelSMaP: A Selective Stride Masking Prefetching Scheme. ICCD 2017: 369-372 - [c13]Reena Panda, Xinnian Zheng, Lizy Kurian John:
Accurate address streams for LLC and beyond (SLAB): A methodology to enable system exploration. ISPASS 2017: 87-96 - [c12]Reena Panda, Lizy Kurian John:
Proxy benchmarks for emerging big-data workloads. ISPASS 2017: 139-140 - [c11]Jiajun Wang, Reena Panda, Lizy Kurian John:
Prefetching for cloud workloads: An analysis based on address patterns. ISPASS 2017: 163-172 - 2016
- [c10]Jee Ho Ryoo, Mitesh R. Meswani, Reena Panda, Lizy K. John:
POSTER: SILC-FM: Subblocked InterLeaved Cache-Like Flat Memory Organization. PACT 2016: 435-437 - [c9]Shuang Song, Meng Li, Xinnian Zheng, Michael LeBeane, Jee Ho Ryoo, Reena Panda, Andreas Gerstlauer, Lizy K. John:
Proxy-Guided Load Balancing of Graph Processing Workloads on Heterogeneous Clusters. ICPP 2016: 77-86 - [c8]Reena Panda, Yasuko Eckert, Nuwan Jayasena, Onur Kayiran, Michael Boyer, Lizy Kurian John:
Prefetching Techniques for Near-memory Throughput Processors. ICS 2016: 40:1-40:14 - [c7]Reena Panda, Xinnian Zheng, Shuang Song, Jee Ho Ryoo, Michael LeBeane, Andreas Gerstlauer, Lizy K. John:
Genesys: Automatically generating representative training sets for predictive benchmarking. SAMOS 2016: 116-123 - 2015
- [c6]Jee Ho Ryoo, Saddam Jamil Quirem, Michael LeBeane, Reena Panda, Shuang Song, Lizy K. John:
GPGPU Benchmark Suites: How Well Do They Sample the Performance Spectrum? ICPP 2015: 320-329 - [c5]Michael LeBeane, Jee Ho Ryoo, Reena Panda, Lizy Kurian John:
Watt Watcher: Fine-Grained Power Estimation for Emerging Workloads. SBAC-PAD 2015: 106-113 - [c4]Reena Panda, Christopher Erb, Michael LeBeane, Jee Ho Ryoo, Lizy Kurian John:
Performance Characterization of Modern Databases on Out-of-Order CPUs. SBAC-PAD 2015: 114-121 - [c3]Michael LeBeane, Shuang Song, Reena Panda, Jee Ho Ryoo, Lizy K. John:
Data partitioning strategies for graph workloads on heterogeneous clusters. SC 2015: 56:1-56:12 - 2014
- [c2]Reena Panda, Lizy Kurian John:
Data analytics workloads: Characterization and similarity analysis. IPCCC 2014: 1-9 - [c1]David Kadjo, Jinchun Kim, Prabal Sharma, Reena Panda, Paul Gratz, Daniel A. Jiménez:
B-Fetch: Branch Prediction Directed Prefetching for Chip-Multiprocessors. MICRO 2014: 623-634 - 2012
- [j1]Reena Panda, Paul V. Gratz, Daniel A. Jiménez:
B-Fetch: Branch Prediction Directed Prefetching for In-Order Processors. IEEE Comput. Archit. Lett. 11(2): 41-44 (2012)
Coauthor Index
aka: Lizy K. John
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint