Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fault-tolerant strategy for virtualized HPC clusters., and . The Journal of Supercomputing, 50 (3): 209-239 (2009)Cost-Performance Evaluation of SMP Clusters., , , and . PDPTA, page 718-724. CSREA Press, (1999)Accelerating the HMMER Sequence Analysis Suite Using Conventional Processors., , and . AINA (1), page 289-294. IEEE Computer Society, (2006)Adaptive Secure Access to Remote Services., , and . IEEE SCC (1), page 173-181. IEEE Computer Society, (2008)Evaluation of cluster interconnects for a distributed shared memory., and . IPCCC, page 1-7. IEEE, (1999)Editorial., , , and . Microprocessors and Microsystems - Embedded Hardware Design, 33 (4): 233-234 (2009)Listen-while-talking: a technique for primary user protection., , and . WCNC, page 527-531. IEEE, (2009)Minimum dependence distance tiling of nested loops with non-uniform dependences., and . SPDP, page 74-81. IEEE Computer Society, (1994)Exploiting Multi-level Parallelism for Homology Search using General Purpose Processors., and . ICPADS (2), page 331-335. IEEE Computer Society, (2005)Antisocial Behavior of Agents in Scheduling Mechanisms., , and . IEEE Trans. Systems, Man, and Cybernetics, Part A, 37 (6): 946-954 (2007)