default search action
Xiaotong Zhuang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j7]Xiaotong Zhuang, Santosh Pande:
Compiler-Supported Thread Management for Multithreaded Network Processors. ACM Trans. Embed. Comput. Syst. 10(4): 44:1-44:31 (2011) - 2010
- [j6]Xiaotong Zhuang, Santosh Pande:
An optimization framework for embedded processors with auto-addressing mode. ACM Trans. Program. Lang. Syst. 32(4): 11:1-11:41 (2010) - [c27]Haibo Lin, Chao Li, Qian Wang, Yi Zhao, Ninghe Pan, Xiaotong Zhuang, Ling Shao:
Automated Tuning in Parallel Sorting on Multi-core Architectures. Euro-Par (1) 2010: 14-25
2000 – 2009
- 2009
- [c26]Xiaotong Zhuang, Alexandre E. Eichenberger, Yangchun Luo, Kevin O'Brien, Kathryn M. O'Brien:
Exploiting Parallelism with Dependence-Aware Scheduling. PACT 2009: 193-202 - [c25]Mauricio J. Serrano, Xiaotong Zhuang:
Building Approximate Calling Context from Partial Call Traces. CGO 2009: 221-230 - [c24]Mauricio J. Serrano, Xiaotong Zhuang:
Placement optimization using data context collected during garbage collection. ISMM 2009: 69-78 - 2008
- [c23]Xiaotong Zhuang, Suhyun Kim, Mauricio J. Serrano, Jong-Deok Choi:
Perfdiff: a framework for performance difference analysis in a virtual machine environment. CGO 2008: 4-13 - 2007
- [j5]Xiaotong Zhuang, Hsien-Hsin S. Lee:
Reducing Cache Pollution via Dynamic Data Prefetch Filtering. IEEE Trans. Computers 56(1): 18-31 (2007) - [j4]Xiaotong Zhuang, Santosh Pande:
Power-efficient prefetching for embedded processors. ACM Trans. Embed. Comput. Syst. 6(1): 3 (2007) - [j3]Xiaotong Zhuang, Santosh Pande:
Allocating architected registers through differential encoding. ACM Trans. Program. Lang. Syst. 29(2): 9 (2007) - 2006
- [b1]Xiaotong Zhuang:
Compiler Optimizations for Multithreaded Multicore Network Processors. Georgia Institute of Technology, Atlanta, GA, USA, 2006 - [j2]Xiaotong Zhuang, Santosh Pande:
Parallelizing load/stores on dual-bank memory embedded processors. ACM Trans. Embed. Comput. Syst. 5(3): 613-657 (2006) - [c22]Tao Zhang, Xiaotong Zhuang, Santosh Pande:
Compiler Optimizations to Reduce Security Overhead. CGO 2006: 346-357 - [c21]Xiaotong Zhuang, Santosh Pande:
A Scalable Priority Queue Architecture for High Speed Network Processing. INFOCOM 2006 - [c20]Ryan Collins, Fernando Alegre, Xiaotong Zhuang, Santosh Pande:
Compiler assisted dynamic management of registers for network processors. IPDPS 2006 - [c19]Xiaotong Zhuang, Santosh Pande:
Effective thread management on network processors with compiler analysis. LCTES 2006: 72-82 - [c18]Xiaotong Zhuang, Tao Zhang, Santosh Pande:
Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection. MICRO 2006: 113-122 - [c17]Xiaotong Zhuang, Mauricio J. Serrano, Harold W. Cain, Jong-Deok Choi:
Accurate, efficient, and adaptive calling context profiling. PLDI 2006: 263-271 - 2005
- [j1]Xiaotong Zhuang, Vincenzo Liberatore:
A Recursion-Based Broadcast Paradigm in Wormhole Routed Networks. IEEE Trans. Parallel Distributed Syst. 16(11): 1034-1052 (2005) - [c16]Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee:
Anomalous path detection with hardware support. CASES 2005: 43-54 - [c15]Tao Zhang, Xiaotong Zhuang, Santosh Pande:
Building Intrusion-Tolerant Secure Software. CGO 2005: 255-266 - [c14]Xiaotong Zhuang, Santosh Pande:
Differential register allocation. PLDI 2005: 168-179 - 2004
- [c13]Xiaotong Zhuang, Tao Zhang, Santosh Pande:
HIDE: an infrastructure for efficiently protecting information leakage on the address bus. ASPLOS 2004: 72-84 - [c12]Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, Santosh Pande:
Hardware assisted control flow obfuscation for embedded processors. CASES 2004: 292-302 - [c11]Xiaotong Zhuang, Santosh Pande:
Power-efficient prefetching via bit-differential offset assignment on embedded processors. LCTES 2004: 67-77 - [c10]Xiaotong Zhuang, Tao Zhang, Santosh Pande:
Hardware-managed register allocation for embedded processors. LCTES 2004: 192-201 - [c9]Xiaotong Zhuang, Santosh Pande:
Balancing register allocation across threads for a multithreaded network processor. PLDI 2004: 289-300 - 2003
- [c8]Xiaotong Zhuang, Santosh Pande:
Resolving Register Bank Conflicts for a Network Processor. IEEE PACT 2003: 269-278 - [c7]Xiaotong Zhuang, Santosh Pande:
Compiler Scheduling of Mobile Agents for Minimizing Overheads. ICDCS 2003: 600- - [c6]Xiaotong Zhuang, Hsien-Hsin S. Lee:
A Hardware-based Cache Pollution Filtering Mechanism for Aggressive Prefetches. ICPP 2003: 286-293 - [c5]Xiaotong Zhuang, ChokSheak Lau, Santosh Pande:
Storage assignment optimizations through variable coalescence for embedded processors. LCTES 2003: 220-231 - 2002
- [c4]Xiaotong Zhuang, Santosh Pande, John S. Greenland Jr.:
A Framework for Parallelizing Load/Stores on Embedded Processors. IEEE PACT 2002: 68-79 - [c3]Xiaotong Zhuang, Jian Liu:
WRAPS Scheduling and Its Efficient Implementation on Network Processors. HiPC 2002: 252-263 - [c2]Xiaotong Zhuang, Vincenzo Liberatore:
A Recursion-Based Broadcast Paradigm in Wormhole Routed Mesh/Torus Networks. IPDPS 2002 - [c1]Weidong Shi, Xiaotong Zhuang, Indrani Paul, Karsten Schwan:
Efficient Implementation of Packet Scheduling Algorithm on High-Speed Programmable Network Processors. MMNS 2002: 184-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint