Author of the publication

A technique for overlapping computation and communication for block recursive algorithms.

, , , and . Concurr. Pract. Exp., 10 (2): 73-90 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-propagation based authentication protocol in multihop wireless home networks., , , and . COMSWARE, page 1-5. IEEE, (2006)Software Architecture for Dynamic Thermal Management in Datacenters., , , , and . COMSWARE, IEEE, (2007)Evaluating Performance, Power and Cooling in High-Performance Computing (HPC) Data Centers., , , , and . Handbook of Energy-Aware and Green Computing, Chapman and Hall/CRC, (2012)All-to-All Personalized Communication in a Wormhole-Routed Torus., and . ICPP (1), page 76-79. CRC Press, (1995)The personal sensor network: a user-centric monitoring solution., , , , and . BODYNETS, page 24. ICST, (2007)Toward autonomous vehicle safety verification from mobile cyber-physical systems perspective., , and . SIGBED Review, 8 (2): 19-22 (2011)Optimal RSS threshold selection in connectivity-based localization schemes., , and . MSWiM, page 220-228. ACM, (2008)Using transient thermal models to predict cyberphysical phenomena in data centers., , , , and . Sustain. Comput. Informatics Syst., 3 (3): 132-147 (2013)Self-stabilizing multicast protocols for ad hoc networks., and . J. Parallel Distributed Comput., 63 (1): 87-96 (2003)Implementing Fast Fourier Transforms on Distributed-Memory Multiprocessors Using Data Redistributions., , , and . Parallel Process. Lett., (1994)