Остановите войну!
for scientists:
default search action
Trevor E. Carlson
- > Home > Persons > Trevor E. Carlson
Publications
- 2022
- [c40]Alen Sabu, Harish Patil, Wim Heirman, Trevor E. Carlson:
LoopPoint: Checkpoint-driven Sampled Simulation for Multi-threaded Applications. HPCA 2022: 604-618 - 2021
- [c36]Harish Patil, Alexander Isaev, Wim Heirman, Alen Sabu, Ali Hajiabadi, Trevor E. Carlson:
ELFies: Executable Region Checkpoints for Performance Analysis and Simulation. CGO 2021: 126-136 - 2015
- [j4]Trevor E. Carlson, Siddharth Nilakantan, Mark Hempstead, Wim Heirman:
Epoch Profiles: Microarchitecture-Based Application Analysis and Optimization. IEEE Comput. Archit. Lett. 14(1): 30-33 (2015) - [c17]Sudhanshu Shekhar Jha, Wim Heirman, Ayose Falcón, Trevor E. Carlson, Kenzo Van Craeynest, Jordi Tubella, Antonio González, Lieven Eeckhout:
Chrysso: an integrated power manager for constrained many-core processors. Conf. Computing Frontiers 2015: 19:1-19:8 - [c15]Trevor E. Carlson, Wim Heirman, Osman Allam, Stefanos Kaxiras, Lieven Eeckhout:
The load slice core microarchitecture. ISCA 2015: 272-284 - 2014
- [j3]Trevor E. Carlson, Wim Heirman, Stijn Eyerman, Ibrahim Hur, Lieven Eeckhout:
An Evaluation of High-Level Mechanistic Core Models. ACM Trans. Archit. Code Optim. 11(3): 28:1-28:25 (2014) - [c12]Wim Heirman, Trevor E. Carlson, Kenzo Van Craeynest, Ibrahim Hur, Aamer Jaleel, Lieven Eeckhout:
Undersubscribed threading on clustered cache architectures. HPCA 2014: 678-689 - [c11]Wim Heirman, Trevor E. Carlson, Kenzo Van Craeynest, Ibrahim Hur, Aamer Jaleel, Lieven Eeckhout:
Automatic SMT threading for OpenMP applications on the Intel Xeon Phi co-processor. ROSS@ICS 2014: 7:1-7:7 - [c10]Trevor E. Carlson, Wim Heirman, Kenzo Van Craeynest, Lieven Eeckhout:
BarrierPoint: Sampled simulation of multi-threaded applications. ISPASS 2014: 2-12 - 2013
- [j2]Chuntao Jiang, Zhibin Yu, Hai Jin, Cheng-Zhong Xu, Lieven Eeckhout, Wim Heirman, Trevor E. Carlson, Xiaofei Liao:
PCantorSim: Accelerating parallel architecture simulation through fractal-based sampling. ACM Trans. Archit. Code Optim. 10(4): 49:1-49:24 (2013) - [c9]Trevor E. Carlson, Wim Heirman, Lieven Eeckhout:
Sampled simulation of multi-threaded applications. ISPASS 2013: 2-12 - [c8]Trevor E. Carlson, Wim Heirman, Kenzo Van Craeynest, Lieven Eeckhout:
Node Performance and Energy Analysis with the Sniper Multi-core Simulator. Parallel Tools Workshop 2013: 79-89 - 2012
- [c7]Wim Heirman, Souradip Sarkar, Trevor E. Carlson, Ibrahim Hur, Lieven Eeckhout:
Power-aware multi-core simulation for early design stage hardware/software co-optimization. PACT 2012: 3-12 - 2011
- [c6]Zhe Ma, Trevor E. Carlson, Wim Heirman, Lieven Eeckhout:
Evaluating Application Vulnerability to Soft Errors in Multi-level Cache Hierarchy. Euro-Par Workshops (2) 2011: 272-281 - [c5]Wim Heirman, Trevor E. Carlson, Shuai Che, Kevin Skadron, Lieven Eeckhout:
Using cycle stacks to understand scaling bottlenecks in multi-threaded workloads. IISWC 2011: 38-49 - [c4]Wim Heirman, Trevor E. Carlson, Souradip Sarkar, Pieter Ghysels, Wim Vanroose, Lieven Eeckhout:
Using Fast and Accurate Simulation to Explore Hardware/Software Trade-offs in the Multi-Core Era. PARCO 2011: 343-350 - [c3]Trevor E. Carlson, Wim Heirman, Lieven Eeckhout:
Sniper: exploring the level of abstraction for scalable and accurate parallel multi-core simulation. SC 2011: 52:1-52:12
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-12 02:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint