Author of the publication

MPI-2: Extending the Message-Passing Interface.

, , , , , , , and . Euro-Par, Vol. I, volume 1123 of Lecture Notes in Computer Science, page 128-135. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding scalability to Internet of Things gateways using parallel computation of edge device data., and . HPEC, page 1-5. IEEE, (2016)Using MPI : portable parallel programming with the message-passing interface, , and . MIT Press, (1994)A Model for Performance Analysis of MPI Applications on Terascale Systems., , , , and . PVM/MPI, volume 2840 of Lecture Notes in Computer Science, page 81-87. Springer, (2003)inAspect: interfacing Java and VSIPL applications., , , , and . Concurr. Pract. Exp., 17 (7-8): 919-940 (2005)MPI Derived Datatypes: Performance and Portability Issues., , , and . EuroMPI, page 15:1-15:10. ACM, (2018)Exposition, clarification, and expansion of MPI semantic terms and conventions: is a nonblocking MPI function permitted to block?, , , , , , and . EuroMPI, page 2:1-2:10. ACM, (2019)GPU Erasure Coding for Campaign Storage., , , and . ISC Workshops, volume 10524 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)A brief survey of Cryptocurrency systems., , , , , and . PST, page 745-752. IEEE, (2016)Provenance threat modeling., , , , , and . PST, page 384-387. IEEE, (2016)Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions., , , , and . MALWARE, page 161-166. IEEE, (2018)