Author of the publication

Porting Third-Party Applications Packages to the Cray T3D: Programming Issues and Scalability Results.

, , , , and . Parallel Computing, 22 (8): 1073-1089 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Porting Third-Party Applications Packages to the Cray T3D: Programming Issues and Scalability Results., , , , and . Parallel Computing, 22 (8): 1073-1089 (1996)Exploring a Local Linear Model Tree Approach to Car-Following., , and . Comp.-Aided Civil and Infrastruct. Engineering, 28 (8): 581-593 (2013)Systems thinking for safety and security., and . ACSAC, page 1-8. ACM, (2013)DAMON: A Data Authenticity Monitoring System for Diabetes Management., , , , and . IoTDI, page 25-36. IEEE Computer Society, (2018)An integrated approach to safety and security based on systems theory., and . Commun. ACM, 57 (2): 31-35 (2014)Reducts and Modal Operators on Residuated Lattices.. TACL, volume 25 of EPiC Series in Computing, page 217-220. EasyChair, (2013)From Interior Algebras to Unital ℓ-Groups: A Unifying Treatment of Modal Residuated Lattices.. Studia Logica, 103 (2): 265-286 (2015)Disaster relief management and resilience using photovoltaic energy., and . CTS, page 628-632. IEEE, (2014)A Channel Propagation Model for the 700 MHz Band., , , , and . ICC, page 1-6. IEEE, (2010)Secure Ada Target: Issues, System Design, and Verification., , , and . IEEE Symposium on Security and Privacy, page 176-183. IEEE Computer Society, (1985)