Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Diskless Checkpoint for Large Scale Systems., , , and . CCGRID, page 63-72. IEEE Computer Society, (2010)Low-overhead diskless checkpoint for hybrid computing systems., , , , and . HiPC, page 1-10. IEEE Computer Society, (2010)GPGPUs: How to combine high computational power with high reliability., , , , , , , , and . DATE, page 1-9. European Design and Automation Association, (2014)Hierarchical Clustering Strategies for Fault Tolerance in Large Scale HPC Systems., , , , and . CLUSTER, page 355-363. IEEE Computer Society, (2012)Optimization of a Multilevel Checkpoint Model with Uncertain Execution Scales., , and . SC, page 907-918. IEEE Computer Society, (2014)Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications., , , , and . HPDC, page 275-278. ACM, (2015)Improving floating point compression through binary masks., and . BigData, page 326-331. IEEE Computer Society, (2013)Detecting silent data corruption through data dynamic monitoring for scientific applications., and . PPOPP, page 381-382. ACM, (2014)Exploiting Spatial Smoothness in HPC Applications to Detect Silent Data Corruption., and . HPCC/CSS/ICESS, page 128-133. IEEE, (2015)Detecting and Correcting Data Corruption in Stencil Applications through Multivariate Interpolation., and . CLUSTER, page 595-602. IEEE Computer Society, (2015)