Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling MapReduce Vertically and Horizontally., , and . SC, page 525-535. IEEE Computer Society, (2014)Sensitivity of Parallel Applications to Large Differences in Bandwidth and Latency in Two-Layer Interconnects., , and . HPCA, page 244-253. IEEE Computer Society, (1999)Model checking a cache coherence protocol of a Java DSM implementation., , , and . J. Log. Algebraic Methods Program., 71 (1): 1-43 (2007)Distributed hierarchical scheduling with explicit grain size control., and . Future Gener. Comput. Syst., 8 (1-3): 111-119 (1992)A Secure Jailing System for Confining Untrusted Applications., , , , and . SECRYPT, page 414-423. INSTICC Press, (2007)Runtime optimizations for a Java DSM implementation., , , and . Java Grande, page 153-162. ACM, (2001)Object combining: A new aggressive optimization for object intensive programs., , , and . Java Grande, page 165-174. ACM, (2002)Run-time optimizations for a Java DSM implementation., , , and . Concurr. Comput. Pract. Exp., 15 (3-5): 299-316 (2003)Scalable Overlapping Community Detection., , , , , and . IPDPS Workshops, page 1463-1472. IEEE Computer Society, (2016)A Platform for RFID Security and Privacy Administration (Awarded Best Paper!)., , , , and . LISA, page 89-102. USENIX, (2006)