Author of the publication

Utilization-Based Heuristics for Statically Mapping Real-Time Applications onto the HiPer-D Heterogeneous Computing System.

, , , , , , , and . IPDPS, IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task Execution Time Modeling for Heterogeneous Computing Systems., , , , and . Heterogeneous Computing Workshop, page 185-199. IEEE Computer Society, (2000)Faster residue multiplication modulo 521-bit mersenne prime and application to ECC ; 521 bitlik mersenne asal modüllerinde hızlı çarpma ve ECC'ye uygulamaları.. Middle East Technical University, Çankaya, Ankara, Turkey, (2017)base-search.net (ftmetuankair:oai:https://open.metu.edu.tr:11511/26963).Message from the HCW Program Chair.. IPDPS Workshops, page 5. IEEE Computer Society, (2014)An Overview of MSHN: The Management System for Heterogeneous Networks., , , , , , , , , and 10 other author(s). Heterogeneous Computing Workshop, page 184-198. IEEE Computer Society, (1999)Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation., , and . ICETE (2), page 485-496. ScitePress, (2020)Robust Processor Allocation for Independent Tasks When Dollar Cost for Processors is a Constraint., , , , , , , , , and 7 other author(s). CLUSTER, page 1-10. IEEE Computer Society, (2005)SDBATS: A Novel Algorithm for Task Scheduling in Heterogeneous Computing Systems., , , , and . IPDPS Workshops, page 43-53. IEEE, (2013)What Are the Top Ten Most Influential Parallel and Distributed Processing Concepts of the Past Millenium?, , , , , , , , , and 1 other author(s). J. Parallel Distributed Comput., 61 (12): 1827-1841 (2001)Utilization-Based Techniques for Statically Mapping Heterogeneous Applications onto the HiPer-D Heterogeneous Computing System., , , , , , , and . Scalable Computing: Practice and Experience, (2002)Biometric data transformation for cryptographic domains and its application: poster., , and . WiSec, page 304-305. ACM, (2019)