Author of the publication

Load-balanced and locality-aware scheduling for data-intensive workloads at extreme scales.

, , , , , , and . Concurrency and Computation: Practice and Experience, 28 (1): 70-94 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural Phrase-to-Phrase Machine Translation., , , , , , , and . CoRR, (2018)Exploiting multi-cores for efficient interchange of large messages in distributed systems., , , , , and . Concurrency and Computation: Practice and Experience, 28 (13): 3568-3585 (2016)Dynamic Virtual Chunks: On Supporting Efficient Accesses to Compressed Scientific Data., , , and . IEEE Trans. Services Computing, 9 (1): 96-109 (2016)Stochastic Strategic Routing Reduces Attack Effects., , , and . GLOBECOM, page 1-5. IEEE, (2011)Improved Algorithms for Two Energy-Optimal Routing Problems in Ad-Hoc Wireless Networks., , , and . BDCloud-SocialCom-SustainCom, page 509-516. IEEE Computer Society, (2016)Load-balanced and locality-aware scheduling for data-intensive workloads at extreme scales., , , , , , and . Concurrency and Computation: Practice and Experience, 28 (1): 70-94 (2016)A flexible QoS fortified distributed key-value storage system for the cloud., , , , , , and . BigData, page 515-522. IEEE Computer Society, (2015)Minimum Power Broadcast: Fast Variants of Greedy Approximations., and . MASS, page 479-487. IEEE Computer Society, (2014)Uncooperative Gait Recognition Using Joint Bayesian., , , , and . ICIG (1), volume 10666 of Lecture Notes in Computer Science, page 118-126. Springer, (2017)Near linear time 5/3-approximation algorithms for two-level power assignment problems., and . FOMC, page 29-38. ACM, (2014)