Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/npc/LuoLKC12
%A Luo, Qiuming
%A Liu, Chengjian
%A Kong, Chang
%A Cai, Ye
%B NPC
%D 2012
%E Park, James J.
%E Zomaya, Albert Y.
%E Yeo, Sang-Soo
%E Sahni, Sartaj
%I Springer
%K dblp
%P 208-216
%T MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms.
%U http://dblp.uni-trier.de/db/conf/npc/npc2012.html#LuoLKC12
%V 7513
%@ 978-3-642-35606-3
@inproceedings{conf/npc/LuoLKC12,
added-at = {2018-06-26T00:00:00.000+0200},
author = {Luo, Qiuming and Liu, Chengjian and Kong, Chang and Cai, Ye},
biburl = {https://www.bibsonomy.org/bibtex/2aa6a9e5aee0738473803ec35578a6eb9/dblp},
booktitle = {NPC},
crossref = {conf/npc/2012},
editor = {Park, James J. and Zomaya, Albert Y. and Yeo, Sang-Soo and Sahni, Sartaj},
ee = {https://doi.org/10.1007/978-3-642-35606-3_24},
interhash = {e2977c16c320180e77883928e2d71609},
intrahash = {aa6a9e5aee0738473803ec35578a6eb9},
isbn = {978-3-642-35606-3},
keywords = {dblp},
pages = {208-216},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T14:22:37.000+0200},
title = {MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms.},
url = {http://dblp.uni-trier.de/db/conf/npc/npc2012.html#LuoLKC12},
volume = 7513,
year = 2012
}