Author of the publication

Scalable Distributed Depth-First Search with Greedy Work Stealing.

, , , and . ICTAI, page 98-103. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstraction Learning., , and . ATVA, volume 6252 of Lecture Notes in Computer Science, page 17. Springer, (2010)Why inheritance anomaly is not worth solving., and . ICOOOLPS@ECOOP, page 6:1-6:12. ACM, (2014)A Meeting Scheduling System Based on Open Constraint Programming., and . CAiSE, volume 2348 of Lecture Notes in Computer Science, page 792-796. Springer, (2002)A CLP Method for Compositional and Intermittent Predicate Abstraction., , and . VMCAI, volume 3855 of Lecture Notes in Computer Science, page 17-32. Springer, (2006)Comparing Weakest Precondition and Weakest Liberal Precondition.. CoRR, (2015)Path-Sensitive Backward Slicing., , , and . SAS, volume 7460 of Lecture Notes in Computer Science, page 231-247. Springer, (2012)Relative Safety., , and . VMCAI, volume 3855 of Lecture Notes in Computer Science, page 282-297. Springer, (2006)Unbounded Symbolic Execution for Program Verification., , and . RV, volume 7186 of Lecture Notes in Computer Science, page 396-411. Springer, (2011)A Declarative Approach to Concurrency in Java., and . APLAS, page 89-98. (2000)A Constraint-Based Framework for Concurrent and Distributed Programming., and . ISCA PDCS, page 51-56. ISCA, (2006)