Crea il mio profilo
Accesso pubblico
Visualizza tutto65 articoli
15 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- William GroppProfessor of Computer Science, University of IllinoisEmail verificata su illinois.edu
- Ewing (Rusty) LuskArgonne National LaboratoryEmail verificata su mcs.anl.gov
- Ron BrightwellSandia National LaboratoriesEmail verificata su sandia.gov
- Richard BrooksProfessor, Computer Engineering, Clemson UniversityEmail verificata su acm.org
- Lu YuThe Holcombe Department of Electrical and Computer Engineering, Clemson UniversityEmail verificata su clemson.edu
- Lee WardEmail verificata su sandia.gov
- Ryan E. GrantQueen's UniversityEmail verificata su queensu.ca
- Manfred MorariElectrical and Systems Engineering, U. of PennsylvaniaEmail verificata su seas.upenn.edu
- Daniel J. HolmesIntel CorporationEmail verificata su intel.com
- Gary WarnerDirector of Research in Computer Forensics, University of Alabama at BirminghamEmail verificata su uab.edu
- Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteEmail verificata su virginia.edu
- Robert FalgoutLawrence Livermore National LaboratoryEmail verificata su llnl.gov
- Jeff GrayU. of Alabama Distinguished Professor, Computer Science; Director, Randall Research ScholarsEmail verificata su cs.ua.edu
- Glenn JuddEmail verificata su cs.cmu.edu
- Vladimir GetovUniversity of WestminsterEmail verificata su westminster.ac.uk
- Bryan CarpenterSenior lecturer, School of Computing, University of PortsmouthEmail verificata su port.ac.uk
- Patrick G. BridgesScalable Systems Laboratory, Department of Computer Science, University of New MexicoEmail verificata su cs.unm.edu
- Amin HassaniPhD. Candidate, University of Alabama at BirminghamEmail verificata su cis.uab.edu