This contains my bachelors thesis and associated tex files, code snippets and maybe more.
Topic: Data Movement in Heterogeneous Memories with Intel Data Streaming Accelerator
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
% $ biblatex auxiliary file $ % $ biblatex bbl format version 3.1 $ % Do not modify the above lines! % % This is an auxiliary file used by the 'biblatex' package. % This file may safely be deleted. It will be recreated by % biber as required. % \begingroup \makeatletter \@ifundefined{ver@biblatex.sty} {\@latex@error {Missing 'biblatex' package} {The bibliography requires the 'biblatex' package.} \aftergroup\endinput} {} \endgroup
\refsection{0} \datalist[entry]{anyt/global//global/global} \entry{becher04:_feurig_hacken_mit_firew}{inproceedings}{} \name{author}{2}{}{% {{hash=9b3cc80bad616f9b1a14a1ff817c340b}{% family={Becher}, familyi={B\bibinitperiod}, given={Michael}, giveni={M\bibinitperiod}}}% {{hash=996f6a7b5d7e6fce1d3d9149897fb2ea}{% family={Dornseif}, familyi={D\bibinitperiod}, given={Maximillian}, giveni={M\bibinitperiod}}}% } \strng{namehash}{2e447d6574416e669e938440136dd1c5} \strng{fullhash}{2e447d6574416e669e938440136dd1c5} \strng{bibnamehash}{2e447d6574416e669e938440136dd1c5} \strng{authorbibnamehash}{2e447d6574416e669e938440136dd1c5} \strng{authornamehash}{2e447d6574416e669e938440136dd1c5} \strng{authorfullhash}{2e447d6574416e669e938440136dd1c5} \field{labelalpha}{BD04} \field{sortinit}{B} \field{sortinithash}{8de16967003c7207dae369d874f1456e} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{21C3: Proceedings of the 21st Chaos Communication Congress} \field{month}{12} \field{title}{{Feuriges Hacken - Spaß mit Firewire}} \field{year}{2004} \field{dateera}{ce} \endentry \entry{bellard2005qfa}{inproceedings}{} \name{author}{1}{}{% {{hash=4337d6f14dfa35071b858acc19f95129}{% family={Bellard}, familyi={B\bibinitperiod}, given={Fabrice}, giveni={F\bibinitperiod}}}% } \strng{namehash}{4337d6f14dfa35071b858acc19f95129} \strng{fullhash}{4337d6f14dfa35071b858acc19f95129} \strng{bibnamehash}{4337d6f14dfa35071b858acc19f95129} \strng{authorbibnamehash}{4337d6f14dfa35071b858acc19f95129} \strng{authornamehash}{4337d6f14dfa35071b858acc19f95129} \strng{authorfullhash}{4337d6f14dfa35071b858acc19f95129} \field{labelalpha}{Bel05} \field{sortinit}{B} \field{sortinithash}{8de16967003c7207dae369d874f1456e} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the USENIX Annual Technical Conference, FREENIX Track} \field{title}{{QEMU, a fast and portable dynamic translator}} \field{year}{2005} \field{dateera}{ce} \field{pages}{41\bibrangedash 46} \range{pages}{6} \endentry \entry{boileau06}{inproceedings}{} \name{author}{1}{}{% {{hash=69a714b1aad3615b5e35fcc1a4976fef}{% family={Boileau}, familyi={B\bibinitperiod}, given={Adam}, giveni={A\bibinitperiod}}}% } \strng{namehash}{69a714b1aad3615b5e35fcc1a4976fef} \strng{fullhash}{69a714b1aad3615b5e35fcc1a4976fef} \strng{bibnamehash}{69a714b1aad3615b5e35fcc1a4976fef} \strng{authorbibnamehash}{69a714b1aad3615b5e35fcc1a4976fef} \strng{authornamehash}{69a714b1aad3615b5e35fcc1a4976fef} \strng{authorfullhash}{69a714b1aad3615b5e35fcc1a4976fef} \field{labelalpha}{Boi06} \field{sortinit}{B} \field{sortinithash}{8de16967003c7207dae369d874f1456e} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{RUXCON} \field{title}{{Hit by a Bus: Physical Access Attacks with Firewire}} \field{year}{2006} \field{dateera}{ce} \endentry \entry{green04}{online}{} \name{author}{1}{}{% {{hash=97aea4b1cf57268b17599c6760e3f694}{% family={Green}, familyi={G\bibinitperiod}, given={Tom}, giveni={T\bibinitperiod}}}% } \strng{namehash}{97aea4b1cf57268b17599c6760e3f694} \strng{fullhash}{97aea4b1cf57268b17599c6760e3f694} \strng{bibnamehash}{97aea4b1cf57268b17599c6760e3f694} \strng{authorbibnamehash}{97aea4b1cf57268b17599c6760e3f694} \strng{authornamehash}{97aea4b1cf57268b17599c6760e3f694} \strng{authorfullhash}{97aea4b1cf57268b17599c6760e3f694} \field{labelalpha}{Gre04} \field{sortinit}{G} \field{sortinithash}{62eb2aa29549e4fdbd3cb154ec5711cb} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Slide presentation at the WinHEC 2004} \field{title}{{1394 Kernel Debugging Tips and Tricks}} \field{urlday}{3} \field{urlmonth}{6} \field{urlyear}{2009} \field{year}{2004} \field{dateera}{ce} \field{urldateera}{ce} \verb{urlraw} \verb http://download.microsoft.com/download/1/8/f/18f8cee2-0b64-41f2-893d-a6f2295b40c8/DW04001_WINHEC2004.ppt \endverb \verb{url} \verb http://download.microsoft.com/download/1/8/f/18f8cee2-0b64-41f2-893d-a6f2295b40c8/DW04001_WINHEC2004.ppt \endverb \endentry \entry{patent:4819234}{patent}{} \name{author}{1}{}{% {{hash=5175eb328916daa79d7df4e4a90143f1}{% family={Huber}, familyi={H\bibinitperiod}, given={William\bibnamedelima S.}, giveni={W\bibinitperiod\bibinitdelim S\bibinitperiod}}}% } \list{location}{1}{% {Needham, MA}% } \strng{namehash}{5175eb328916daa79d7df4e4a90143f1} \strng{fullhash}{5175eb328916daa79d7df4e4a90143f1} \strng{bibnamehash}{5175eb328916daa79d7df4e4a90143f1} \strng{authorbibnamehash}{5175eb328916daa79d7df4e4a90143f1} \strng{authornamehash}{5175eb328916daa79d7df4e4a90143f1} \strng{authorfullhash}{5175eb328916daa79d7df4e4a90143f1} \field{labelalpha}{Hub89} \field{sortinit}{H} \field{sortinithash}{6db6145dae8dc9e1271a8d556090b50a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{4} \field{number}{4819234} \field{title}{Operating system debugger} \field{year}{1989} \field{dateera}{ce} \verb{urlraw} \verb http://www.freepatentsonline.com/4819234.html \endverb \verb{url} \verb http://www.freepatentsonline.com/4819234.html \endverb \endentry \enddatalist \endrefsection \endinput
|