Author of the publication

Detection and correction of silent data corruption for large-scale high-performance computing.

, , , , , and . SC, page 78. IEEE/ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating incremental checkpointing for extreme-scale computing., , , , and . Future Generation Comp. Syst., (2014)Design, Implementation, and Performance of MPI on Portals 3.0., , and . IJHPCA, 17 (1): 7-19 (2003)Portals 3.0: Protocol Building Blocks for Low Overhead Communication., , , and . IPDPS, IEEE Computer Society, (2002)Performance and Scalability of Lightweight Multi-kernel Based Operating Systems., , , , , , and . IPDPS, page 116-125. IEEE Computer Society, (2018)Instruction-level simulation of a cluster at scale., , , and . SC, ACM, (2009)RMPP: The Reliable Message Passing Protocol., and . LCN, page 658-666. IEEE Computer Society, (2002)Alleviating scalability issues of checkpointing protocols., , , , , and . SC, page 18. IEEE/ACM, (2012)Operating System Strategies., and . Encyclopedia of Parallel Computing, Springer, (2011)Analyzing the Impact of Overlap, Offload, and Independent Progress for Message Passing Interface Applications., , and . IJHPCA, 19 (2): 103-117 (2005)Seshat Collects MPI Traces: Extended Abstract.. PVM/MPI, volume 4757 of Lecture Notes in Computer Science, page 384-386. Springer, (2007)