Author of the publication

The Hector Distributed Run-Time Environment.

, , , and . IEEE Trans. Parallel Distributed Syst., 9 (11): 1102-1114 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phase space power analysis for PC-based rootkit detection., , , and . ACM Southeast Regional Conference, page 82-90. ACM, (2022)Hector: Automated Task Allocation for MPI., , , and . IPPS, page 344-348. IEEE Computer Society, (1996)Hector: an agent based architecture for dynamic resource management., , , , , , and . IEEE Concurrency, 7 (2): 47-55 (1999)Using Hector to run MPI programs over networked workstations., , , , , and . Concurr. Pract. Exp., 11 (4): 189-204 (1999)802.11g packet-loss behavior at high sustained bit rates in the home., and . IEEE Trans. Consumer Electronics, 55 (2): 788-791 (2009)A framework for calculating fundamental DVR performance limits., and . IEEE Trans. Consumer Electronics, 55 (1): 132-138 (2009)Digital video recording onto solid-state disks: feasibility and lifetime estimation., and . IEEE Trans. Consumer Electronics, 57 (2): 558-563 (2011)Packet loss behavior of homeplug AV traffic at video bit rates., and . IEEE Trans. Consumer Electronics, 57 (2): 823-826 (2011)An artificial immune system model for intelligent agents., , , and . Future Gener. Comput. Syst., 17 (4): 335-343 (2001)Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs., , , and . SECRYPT, page 181-192. SCITEPRESS, (2022)