Author of the publication

An overview of the BlueGene/L Supercomputer.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . SC, page 7:1-7:22. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101822 (December 2023)Research on intelligent fault diagnosis method for complex equipment based on decision-level fusion., , , and . ICMLC, page 386-390. IEEE, (2010)Exploring Hypergraph Representation on Face Anti-spoofing Beyond 2D Attacks., , , , and . CoRR, (2018)An interference mitigation approach for a dense heterogeneous wireless sensor network., , and . ICSPCS, page 1-7. IEEE, (2015)In-Band Sensing without Quiet Period in Cognitive Radio., , and . WCNC, page 723-728. IEEE, (2008)Simulation and Verification of Jamming Performance of Suspended Projectile-Carried Communication Jammer for Frequency Hopping Radio with Typical Modulation Mode., , , and . ICCT, page 1231-1235. IEEE, (2019)Stability Analysis of Car-Following Model with Uncertainty in Perceiving Velocity., , , , , and . ITITS (1), volume 454 of Advances in Intelligent Systems and Computing, page 409-415. (2015)DC microgrid dynamic performance assessment and enhancement based on virtual impedance method., and . IECON, page 1363-1369. IEEE, (2014)Selection mechanism of the minimal wave speed to the Lotka-Volterra competition model., , , and . Appl. Math. Lett., (2020)Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability., , , , and . COMPSAC Workshops, page 95-100. IEEE Computer Society, (2013)