default search action
Kevin Angstadt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Cailani Lemieux Mack, Kevin Leach, Kevin Angstadt:
Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles. ICCPS 2024: 135-146 - 2022
- [j3]Kevin Angstadt, Tommy Tracy II, Kevin Skadron, Jean-Baptiste Jeannin, Westley Weimer:
Synthesizing Legacy String Code for FPGAs Using Bounded Automata Learning. IEEE Micro 42(5): 70-77 (2022) - [c13]Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). ISSRE 2022: 73-84 - [c12]Hammad Ahmad, Colton Holoday, Ian Bertram, Kevin Angstadt, Zohreh Sharafi, Westley Weimer:
LOGI: an empirical model of heat-induced disk drive data loss and its implications for data recovery. PROMISE 2022: 52-61 - 2021
- [c11]Fee Lia Christoph, Westley Weimer, Kevin Angstadt:
The Early Bird Gets the Worm: Major Retention in CS3. ITiCSE (1) 2021: 422-428 - 2020
- [b1]Kevin Angstadt:
Improving Programming Support for Hardware Accelerators Through Automata Processing Abstractions. University of Michigan, USA, 2020 - [c10]Kevin Angstadt, Jean-Baptiste Jeannin, Westley Weimer:
Accelerating Legacy String Kernels via Bounded Automata Learning. ASPLOS 2020: 235-249 - [c9]Yujun Qin, Samuel Gonzalez, Kevin Angstadt, Xiaowei Wang, Stephanie Forrest, Reetuparna Das, Kevin Leach, Westley Weimer:
MARTINI: Memory Access Traces to Detect Attacks. CCSW 2020: 77-90 - [c8]Yu Huang, Kevin Angstadt, Kevin Leach, Westley Weimer:
Selective Symbolic Type-Guided Checkpointing and Restoration for Autonomous Vehicle Repair. ICSE (Workshops) 2020: 3-10
2010 – 2019
- 2019
- [j2]Kevin Angstadt, Jack Wadden, Westley Weimer, Kevin Skadron:
Portable Programming with RAPID. IEEE Trans. Parallel Distributed Syst. 30(4): 939-952 (2019) - [c7]Matthew Casias, Kevin Angstadt, Tommy Tracy II, Kevin Skadron, Westley Weimer:
Debugging Support for Pattern-Matching Languages and Accelerators. ASPLOS 2019: 1073-1086 - 2018
- [j1]Kevin Angstadt, Jack Wadden, Vinh Dang, Ted Xie, Dan Kramp, Westley Weimer, Mircea Stan, Kevin Skadron:
MNCaRT: An Open-Source, Multi-Architecture Automata-Processing Research and Execution Ecosystem. IEEE Comput. Archit. Lett. 17(1): 84-87 (2018) - [c6]Jack Wadden, Kevin Angstadt, Kevin Skadron:
Characterizing and Mitigating Output Reporting Bottlenecks in Spatial Automata Processing Architectures. HPCA 2018: 749-761 - [c5]Kevin Angstadt, Arun Subramaniyan, Elaheh Sadredini, Reza Rahimi, Kevin Skadron, Westley Weimer, Reetuparna Das:
ASPEN: A Scalable In-SRAM Architecture for Pushdown Automata. MICRO 2018: 921-932 - 2016
- [c4]Kevin Angstadt, Westley Weimer, Kevin Skadron:
RAPID Programming of Pattern-Recognition Processors. ASPLOS 2016: 593-605 - [c3]Ke Wang, Kevin Angstadt, Chunkun Bo, Nathan Brunelle, Elaheh Sadredini, Tommy Tracy II, Jack Wadden, Mircea R. Stan, Kevin Skadron:
An overview of micron's automata processor. CODES+ISSS 2016: 14:1-14:3 - [c2]Kate Highnam, Kevin Angstadt, Kevin Leach, Westley Weimer, Aaron Paulos, Patrick Hurley:
An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. DSN Workshops 2016: 222-225 - 2015
- [c1]Kevin Angstadt, Ed Harcourt:
A virtual machine model for accelerating relational database joins using a general purpose GPU. SpringSim (HPS) 2015: 127-134
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 21:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint