Author of the publication

Asynchronous Checkpointing by Dedicated Checkpoint Threads.

, , , and . EuroMPI, volume 7490 of Lecture Notes in Computer Science, page 289-290. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey., , , , , , , and . CoRR, (2021)Asynchronous Checkpointing by Dedicated Checkpoint Threads., , , and . EuroMPI, volume 7490 of Lecture Notes in Computer Science, page 289-290. Springer, (2012)WhatsApp Network Forensics: Discovering the IP Addresses of Suspects., , , , and . NTMS, page 1-7. IEEE, (2021)Data Redundancy Management in Connected Environments., , , and . Q2SWinet, page 75-80. ACM, (2020)Remote Sensing Analysis of Quaternary Deformation using River Networks in Hindukush Region., , and . IGARSS (2), page 369-372. IEEE, (2009)Joint user association and energy efficiency maximization in beyond 5G heterogeneous networks., , , , , and . Int. J. Commun. Syst., (2022)Stomatal State Identification and Classification in Quinoa Microscopic Imprints through Deep Learning., , , , , , , , , and 3 other author(s). Complex., (2021)Drainage Network and Seismological Analysis of Active Tectonics in Nanga Parbat Haramosh Massif, Pakistan., , and . IGARSS (1), page 9-12. IEEE, (2009)Remote Sensing Analysis of Recent Active Tectonics in Pamir Using Digital Elevation Model: River Profile Approach., , and . IGARSS (2), page 1259-1262. IEEE, (2008)On the use of CryptDB for securing Electronic Health data in the cloud: A performance study., , and . HealthCom, page 120-125. IEEE, (2015)