Get my own profile
Public access
View all65 articles
15 articles
available
not available
Based on funding mandates
Co-authors
- William GroppProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
- Ewing (Rusty) LuskArgonne National LaboratoryVerified email at mcs.anl.gov
- Ron BrightwellSandia National LaboratoriesVerified email at sandia.gov
- Richard BrooksProfessor, Computer Engineering, Clemson UniversityVerified email at acm.org
- Lu YuThe Holcombe Department of Electrical and Computer Engineering, Clemson UniversityVerified email at clemson.edu
- Lee WardVerified email at sandia.gov
- Ryan E. GrantQueen's UniversityVerified email at queensu.ca
- Manfred MorariElectrical and Systems Engineering, U. of PennsylvaniaVerified email at seas.upenn.edu
- Daniel J. HolmesIntel CorporationVerified email at intel.com
- Gary WarnerDirector of Research in Computer Forensics, University of Alabama at BirminghamVerified email at uab.edu
- Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteVerified email at virginia.edu
- Robert FalgoutLawrence Livermore National LaboratoryVerified email at llnl.gov
- Jeff GrayU. of Alabama Distinguished Professor, Computer Science; Director, Randall Research ScholarsVerified email at cs.ua.edu
- Glenn JuddVerified email at cs.cmu.edu
- Vladimir GetovUniversity of WestminsterVerified email at westminster.ac.uk
- Bryan CarpenterSenior lecturer, School of Computing, University of PortsmouthVerified email at port.ac.uk
- Patrick G. BridgesScalable Systems Laboratory, Department of Computer Science, University of New MexicoVerified email at cs.unm.edu
- Amin HassaniPhD. Candidate, University of Alabama at BirminghamVerified email at cis.uab.edu