Author of the publication

Integrating Inter-Node Communication with a Resilient Asynchronous Many-Task Runtime System.

, , , , , , , and . ExaMPI@SC, page 41-51. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shifted Power Method for Computing Tensor Eigenpairs., and . SIAM J. Matrix Anal. Appl., 32 (4): 1095-1124 (2011)Resource monitoring and management with OVIS to enable HPC in cloud computing environments., , , , , , and . IPDPS, page 1-8. IEEE, (2009)A Robust Technique to Make a 2D Advection Solver Tolerant to Soft Faults., , , , , and . ICCS, volume 80 of Procedia Computer Science, page 1917-1926. Elsevier, (2016)Physics-Based Checksums for Silent-Error Detection in PDE Solvers., , and . Euro-Par Workshops, volume 11997 of Lecture Notes in Computer Science, page 681-693. Springer, (2019)Combining Virtualization, resource characterization, and Resource management to enable efficient high performance compute platforms through intelligent dynamic resource allocation., , , , , , , , and . IPDPS Workshops, page 1-8. IEEE, (2010)Exploring Failure Recovery for Stencil-based Applications at Extreme Scales., , , , , , and . HPDC, page 279-282. ACM, (2015)Local recovery and failure masking for stencil-based applications at extreme scales., , , , , , and . SC, page 70:1-70:12. ACM, (2015)Using Probabilistic Characterization to Reduce Runtime Faults in HPC Systems., , , , , , and . CCGRID, page 759-764. IEEE Computer Society, (2008)Leveraging complexity in software for cybersecurity., and . CSIIRW, page 31. ACM, (2009)Tradeoffs in targeted fuzzing of cyber systems by defenders and attackers., and . CSIIRW, page 37. ACM, (2011)