Author of the publication

A communications simulation methodology for AMR codes using task dependency analysis.

, , , , , and . IA3@SC, page 11:1-11:4. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion signature creation via clustering anomalies., and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730C. SPIE, (2008)A communications simulation methodology for AMR codes using task dependency analysis., , , , , and . IA3@SC, page 11:1-11:4. ACM, (2013)Static Analysis Techniques for Semiautomatic Synthesis of Message Passing Software Skeletons., , , , and . ACM Trans. Model. Comput. Simul., 26 (1): 4:1-4:24 (2015)Validation and Uncertainty Assessment of Extreme-Scale HPC Simulation through Bayesian Inference., , , , , and . Euro-Par, volume 8097 of Lecture Notes in Computer Science, page 41-52. Springer, (2013)Application Modeling for Scalable Simulation of Massively Parallel Systems., , , , and . HPCC/CSS/ICESS, page 238-247. IEEE, (2015)Hybrid on-chip data networks., and . Hot Chips Symposium, page 1-49. IEEE, (2010)Photonic Network-on-Chip Design., , , , and . Integrated Circuits and Systems Springer, (2014)Semi-automatic extraction of software skeletons for benchmarking large-scale parallel applications., , , and . SIGSIM-PADS, page 1-10. ACM, (2013)Validating the Simulation of Large-Scale Parallel Applications Using Statistical Characteristics., , , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 1 (1): 3:1-3:22 (2016)Tools for Enabling Automatic Validation of Large-Scale Parallel Application Simulations., , and . ICSME, page 601-604. IEEE Computer Society, (2014)