Author of the publication

Thread Placement on the Intel Paragon: Modeling and Experimentation.

, , , and . MASCOTS, page 226-231. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disarming offense to facilitate defense., and . NSPW, page 69-75. ACM, (2000)S-ARP: a Secure Address Resolution Protocol., , and . ACSAC, page 66-74. IEEE Computer Society, (2003)Adding Availability to Log Services of Untrusted Machines., , and . ACSAC, page 199-206. IEEE Computer Society, (1999)Scheduling issues in high-performance computing., , , and . SIGMETRICS Perform. Evaluation Rev., 26 (4): 60-69 (1999)L'evoluzione della sicurezza informatica: la prospettiva del CERT-IT, , and . Crimine virtuale, minaccia reale. ICT Security: politiche e strumenti di prevenzione, volume 571.2.7 of FTI Forum per la tecnologia dell'informazione, FrancoAngeli, (2004)A quantitative study of Public Key Infrastructures., , and . Comput. Secur., 22 (1): 56-67 (2003)Workload Characterization For Performance Engineering Of Parallel Applications., and . PDP, page 457-462. IEEE, (1994)Performance Gains from Leaving Idle Processors in Multiprocessor Systems., , , , and . ICPP (3), page 203-210. CRC Press, (1995)Xaba: Exact, Approximate, and Asymptotic Solvers for Multi-class Closed Queueing Networks., , and . Computer Performance Evaluation / TOOLS, volume 1786 of Lecture Notes in Computer Science, page 71-85. Springer, (2000)Secure pebblenets., , , and . MobiHoc, page 156-163. ACM, (2001)