Author of the publication

Algorithms and Architectures for Parallel Processing - ICA3PP 2016 Collocated Workshops: SCDT, TAPEMS, BigTrust, UCER, DLMCS, Granada, Spain, December 14-16, 2016, Proceedings

, , , , , , , , , , , , , , , , and (Eds.) volume 10049 of Lecture Notes in Computer Science, Springer, (2016)
DOI: 10.1007/978-3-319-49956-7

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An entropy measure definition for finite interval-valued hesitant fuzzy sets., , , , and . Knowl.-Based Syst., (2015)New Optimization Techniques in Engineering., and . J. Math. Model. Algorithms in OR, 12 (3): 213-215 (2013)Adding feasibility constraints to a ranking rule under a monotonicity constraint., , , , and . IFSA-EUSFLAT, Atlantis Press, (2015)Heterogeneous PBLAS: Optimization of PBLAS for Heterogeneous Computational Clusters., , and . ISPDC, page 73-80. IEEE Computer Society, (2008)Heterogeneous Computational Model for Landform Attributes Representation on Multicore and Multi-GPU Systems., , , and . ICCS, volume 9 of Procedia Computer Science, page 47-56. Elsevier, (2012)Scalability of Neville elimination using checkerboard partitioning., , , and . Int. J. Comput. Math., 85 (3&4): 309-317 (2008)Modeling power and energy consumption of dense matrix factorizations on multicore processors., , , and . Concurrency and Computation: Practice and Experience, 26 (17): 2743-2757 (2014)Parallel online time warping for real-time audio-to-score alignment in multi-core systems., , , , , and . The Journal of Supercomputing, 73 (1): 126-138 (2017)Automatic routine tuning to represent landform attributes on multicore and multi-GPU systems., , , and . The Journal of Supercomputing, 70 (2): 733-745 (2014)Blocking Neville elimination algorithm for exploiting cache memories., , , and . Applied Mathematics and Computation, 209 (1): 2-9 (2009)