Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Generation and Implementation of FFT Algorithms., and . PPSC, (1999)A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks., , and . SafeConfig@CCS, page 45-52. ACM, (2016)Data Flow, the FFT, and the CRAY T3E., , , , , and . PPSC, (1999)Graph coarsening for path finding in cybersecurity graphs., , and . CSIIRW, page 7. ACM, (2013)Genomic evidence for the Pleistocene and recent population history of Native Americans, , , , , , , , , and 91 other author(s). Science, (2015)Efficient transposition algorithms for large matrices., , , , and . SC, page 656-665. ACM, (1993)A Methodology for Generating Data Distributions to Optimize Communication., , , , , and . SPDP, page 436-441. IEEE Computer Society, (1992)Ouroboros: A Tool for Building Generic, Hybrid, Divide and Conquer Algorithms., and . IPDPS, IEEE Computer Society, (2004)Multilinear algebra and parallel programming., , and . SC, page 20-31. IEEE Computer Society, (1990)Towards a network-of-networks framework for cyber security., , , , , , and . ISI, page 106-108. IEEE, (2013)