Author of the publication

Storage Mapping Optimization for Parallel Programs.

, and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 375-382. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Storage Size for Static Control Programs in Automatic Parallelizers., and . Euro-Par, volume 1300 of Lecture Notes in Computer Science, page 356-363. Springer, (1997)Always-Sustainable Software Security., and . NetSoft, page 480-485. IEEE, (2022)INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks., , , , , , , , , and 11 other author(s). ARES, page 105:1-105:10. ACM, (2020)Automatic Storage Management for Parallel Programs., and . Parallel Comput., 24 (3-4): 649-671 (1998)Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats., and . IEEE Secur. Priv., 21 (3): 37-46 (May 2023)Storage management in parallel programs., and . PDP, page 181-188. IEEE Computer Society, (1997)The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service., , , , , , , , , and 4 other author(s). ARES, page 68:1-68:7. ACM, (2022)Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service., , , , , and . ARES, page 47:1-47:8. ACM, (2018)End-to-End Intent-Based Networking., , , , , , , , , and 6 other author(s). IEEE Commun. Mag., 59 (10): 106-112 (2021)Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target Defense., , , , , , and . NOMS, page 1-3. IEEE, (2023)