Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance-Hereditary Embeddings of Circulant Graphs., , , and . ITCC, page 320-324. IEEE Computer Society, (2003)A Perfomance Evaluation of Adaptive Routing in Bidimensional Cut-Through Networks., , , and . Parallel Processing Letters, (1993)Perfect graph codes over two dimensional lattices., , and . ISIT, page 1047-1051. IEEE, (2010)Mad-postman : A Look-ahead Message Propagation Method For Static Bidimensional Meshes., , and . PDP, page 117-124. IEEE, (1994)Source Misrouting in King Topologies., , , , , , and . HPCC/CSS/ICESS, page 464-471. IEEE, (2014)Adaptive Bubble Router: A Design to Improve Performance in Torus Networks., , , , , and . ICPP, page 58-67. IEEE Computer Society, (1999)Task mapping in rectangular twisted tori., , , , and . SpringSim (HPC), page 15. ACM, (2013)Ghost packets: a deadlock-free solution for k-ary n-cube networks., , , , and . PDP, page 133-139. IEEE Computer Society, (1998)On the Use of Commodity Ethernet Technology in Exascale HPC Systems., , and . HiPC, page 254-263. IEEE Computer Society, (2015)The mont-blanc prototype: an alternative approach for HPC systems., , , , , , , , , and 24 other author(s). SC, page 38. ACM, (2016)