Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Attack and Defense in the Grid Environment.. PVM/MPI, volume 2474 of Lecture Notes in Computer Science, page 10. Springer, (2002)Performance Measurement for Parallel and Distributed Programs: A Structured and Automatic Approach., and . IEEE Trans. Software Eng., 15 (12): 1615-1629 (1989)Diagnosing Distributed Systems with Self-propelled Instrumentation., and . Middleware, volume 5346 of Lecture Notes in Computer Science, page 82-103. Springer, (2008)Mr. Scan: extreme scale density-based clustering using a tree-based network of GPGPU nodes., , and . SC, page 84:1-84:11. ACM, (2013)Performance Measurement of Interpreted Programs., and . Euro-Par, volume 1470 of Lecture Notes in Computer Science, page 146-156. Springer, (1998)A Loop-Aware Search Strategy for Automated Performance Analysis., and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 573-584. Springer, (2005)Efficient, sensitivity resistant binary instrumentation., , and . ISSTA, page 89-99. ACM, (2011)Safety checking of machine code., , and . PLDI, page 70-82. ACM, (2000)Formalizing Sensitivity in Static Analysis for Intrusion Detection., , , , , and . S&P, page 194-. IEEE Computer Society, (2004)A Lightweight Library for Building Scalable Tools., , and . PARA (2), volume 7134 of Lecture Notes in Computer Science, page 419-429. Springer, (2010)