Author of the publication

The Design and Implementation of TIDeFlow: A Dataflow-Inspired Execution Model for Parallel Loops and Task Pipelining.

, , , , and . Int. J. Parallel Program., 44 (2): 278-307 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Design and Implementation of TIDeFlow: A Dataflow-Inspired Execution Model for Parallel Loops and Task Pipelining., , , , and . Int. J. Parallel Program., 44 (2): 278-307 (2016)Optimizing the LU Factorization for Energy Efficiency on a Many-Core Architecture., , , and . LCPC, volume 8664 of Lecture Notes in Computer Science, page 237-251. Springer, (2013)Position Paper: Locality-Driven Scheduling of Tasks for Data-Dependent Multithreading., , , and . IPDPS Workshops, page 1363-1367. IEEE Computer Society, (2014)Generating Fine-Grain Multithreaded Applications Using a Multigrain Approach., , and . ACM Trans. Archit. Code Optim., 14 (4): 47:1-47:26 (2017)Generator of Ethnocultural Learning Objects for the preservation of the languages, customs and traditions indigenous., , and . CLEI, page 1-11. IEEE, (2014)Methodological framework for design and evaluation of interactive systems from a multicultural and emotional perspective., , , and . ChileCHI, page 60-65. ACM, (2013)Producer-Consumer Model of a Textbook for the Community of Human-Computer Interaction in Latin America., , , and . Rev. Iberoam. de Tecnol. del Aprendiz., 11 (1): 23-30 (2016)Discover behavior of Turkish people in Orkut., , , and . CONIELECOMP, page 27. IEEE Computer Society, (2007)Internet Data Analysis Methodology for Cyberterrorism Vocabulary Detection, Combining Techniques of Big Data Analytics, NLP and Semantic Web., , , , , and . Int. J. Semantic Web Inf. Syst., 16 (1): 69-86 (2020)A methodology for designing information security feedback based on User Interface Patterns., , , , and . Adv. Eng. Softw., 40 (12): 1231-1241 (2009)