Crea il mio profilo
Accesso pubblico
Visualizza tutto24 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ian T. FosterUniversity of Chicago and Argonne National LaboratoryEmail verificata su anl.gov
- Pierre RiteauStackHPCEmail verificata su stackhpc.com
- John RofranoSenior Technical Staff Member @ IBM ResearchEmail verificata su us.ibm.com
- Dennis GannonProfessor, Indiana UniversityEmail verificata su indiana.edu
- Jose FortesUniversity of FloridaEmail verificata su ufl.edu
- Asit DanChief Architect, z Services API Management, IBMEmail verificata su us.ibm.com
- Gabriel AntoniuSenior Research Scientist, Inria, IRISA, FranceEmail verificata su inria.fr
- Bogdan NicolaeArgonne National LaboratoryEmail verificata su acm.org
- Steven TueckeUniversity of Chicago & Argonne National LaboratoryEmail verificata su uchicago.edu
- Von WelchCybersecurity Researcher, Indiana UniversityEmail verificata su indiana.edu
- Renato FigueiredoProfessor, Electrical Engineering and Computer Science, Oregon State UniversityEmail verificata su oregonstate.edu
- Ewa DeelmanUniversity of Southern California, Information Sciences InstituteEmail verificata su isi.edu
- Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteEmail verificata su virginia.edu
- Gregor von LaszewskiUniversity of VirginiaEmail verificata su virginia.edu
- Lois Curfman McInnesArgonne National LaboratoryEmail verificata su mcs.anl.gov
Segui
Kate Keahey
Fellow at Computation Institute, University of Chicago and Scientist, Argonne National Laboratory
Email verificata su mcs.anl.gov