default search action
Tom Spink
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Tom Spink, Björn Franke:
Accelerating Shared Library Execution in a DBT. LCTES 2024: 1-11 - 2023
- [c14]Redha Gouicem, Dennis Sprokholt, Jasper Ruehl, Rodrigo C. O. Rocha, Tom Spink, Soham Chakraborty, Pramod Bhatotia:
Risotto: A Dynamic Binary Translator for Weak Memory Model Architectures. ASPLOS (1) 2023: 107-122 - 2022
- [c13]Raven Szewczyk, Kimberley Stonehouse, Antonio Barbalace, Tom Spink:
Leaps and bounds: Analyzing WebAssembly's performance with a focus on bounds checking. IISWC 2022: 256-268 - [c12]Rodrigo C. O. Rocha, Dennis Sprokholt, Martin Fink, Redha Gouicem, Tom Spink, Soham Chakraborty, Pramod Bhatotia:
Lasagne: a static binary translator for weak memory model architectures. PLDI 2022: 888-902 - 2020
- [j5]Martin Kristien, Tom Spink, Brian Campbell, Susmit Sarkar, Ian Stark, Björn Franke, Igor Böhm, Nigel P. Topham:
Fast and Correct Load-Link/Store-Conditional Instruction Handling in DBT Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3544-3554 (2020)
2010 – 2019
- 2019
- [c11]James Renwick, Tom Spink, Björn Franke:
Low-cost deterministic C++ exceptions for embedded systems. CC 2019: 76-86 - [c10]Kuba Kaszyk, Harry Wagstaff, Tom Spink, Björn Franke, Michael F. P. O'Boyle, Bruno Bodin, Henrik Uhrenholt:
Full-System Simulation of Mobile CPU/GPU Platforms. ISPASS 2019: 68-78 - [c9]Haoyu Liu, Tom Spink, Paul Patras:
Uncovering Security Vulnerabilities in the Belkin WeMo Home Automation Ecosystem. PerCom Workshops 2019: 894-899 - [c8]Tom Spink, Harry Wagstaff, Björn Franke:
A Retargetable System-Level DBT Hypervisor. USENIX ATC 2019: 505-520 - [c7]Martin Kristien, Tom Spink, Harry Wagstaff, Björn Franke, Igor Böhm, Nigel P. Topham:
Mitigating JIT compilation latency in virtual execution environments. VEE 2019: 101-107 - 2018
- [j4]Jiska Classen, Daniel Wegemer, Paul Patras, Tom Spink, Matthias Hollick:
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1): 5:1-5:24 (2018) - [j3]Sajad Saeedi, Bruno Bodin, Harry Wagstaff, Andy Nisbet, Luigi Nardi, John Mawer, Nicolas Melot, Oscar Palomar, Emanuele Vespa, Tom Spink, Cosmin Gorgovan, Andrew M. Webb, James Clarkson, Erik Tomusk, Thomas Debrunner, Kuba Kaszyk, Pablo González de Aledo Marugán, Andrey Rodchenko, Graham D. Riley, Christos Kotselidis, Björn Franke, Michael F. P. O'Boyle, Andrew J. Davison, Paul H. J. Kelly, Mikel Luján, Steve B. Furber:
Navigating the Landscape for Real-Time Localization and Mapping for Robotics and Virtual and Augmented Reality. Proc. IEEE 106(11): 2020-2039 (2018) - [j2]Tom Spink, Harry Wagstaff, Björn Franke:
A Retargetable System-level DBT Hypervisor. ACM Trans. Comput. Syst. 36(4): 14:1-14:24 (2018) - [i2]Sajad Saeedi, Bruno Bodin, Harry Wagstaff, Andy Nisbet, Luigi Nardi, John Mawer, Nicolas Melot, Oscar Palomar, Emanuele Vespa, Tom Spink, Cosmin Gorgovan, Andrew M. Webb, James Clarkson, Erik Tomusk, Thomas Debrunner, Kuba Kaszyk, Pablo González de Aledo, Andrey Rodchenko, Graham D. Riley, Christos Kotselidis, Björn Franke, Michael F. P. O'Boyle, Andrew J. Davison, Paul H. J. Kelly, Mikel Luján, Steve B. Furber:
Navigating the Landscape for Real-time Localisation and Mapping for Robotics and Virtual and Augmented Reality. CoRR abs/1808.06352 (2018) - 2017
- [c6]Harry Wagstaff, Bruno Bodin, Tom Spink, Björn Franke:
SimBench: A portable benchmarking methodology for full-system simulators. ISPASS 2017: 217-226 - [c5]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [i1]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - 2016
- [j1]Tom Spink, Harry Wagstaff, Björn Franke:
Hardware-Accelerated Cross-Architecture Full-System Virtualization. ACM Trans. Archit. Code Optim. 13(4): 36:1-36:25 (2016) - [c4]Tom Spink, Harry Wagstaff, Björn Franke:
Efficient asynchronous interrupt handling in a full-system instruction set simulator. LCTES 2016: 1-10 - 2015
- [c3]Tom Spink, Harry Wagstaff, Björn Franke, Nigel P. Topham:
Efficient dual-ISA support in a retargetable, asynchronous Dynamic Binary Translator. SAMOS 2015: 103-112 - 2014
- [c2]Harry Wagstaff, Tom Spink, Björn Franke:
Automated ISA branch coverage analysis and test case generation for retargetable instruction set simulators. CASES 2014: 15:1-15:10 - [c1]Tom Spink, Harry Wagstaff, Björn Franke, Nigel P. Topham:
Efficient code generation in a region-based dynamic binary translator. LCTES 2014: 3-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint