Author of the publication

The Effectiveness of Threshold-Based Scheduling Policies in BOINC Projects.

, , , , , and . e-Science, page 88. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2TL: A Scheduling Algorithm for Meeting the Latency Requirements of Bursty I/O Streams at User-Specified Percentiles., , and . ICCAC, page 46-57. IEEE Computer Society, (2017)Rate-Controlled Scheduling of Expired Writes for Volatile Caches., , and . QEST, page 51-62. IEEE Computer Society, (2006)Combining learning strategies and tools in a first course in computer architecture., , and . WCAE, page 8. ACM, (2003)Towards a cross-platform microbenchmark suite for evaluating hardware performance counter data., , , and . Richard Tapia Celebration of Diversity in Computing Conference, page 36-39. ACM, (2005)Resource consumption prediction using neuro-fuzzy modeling., and . NAFIPS, page 1-6. IEEE, (2016)Stampede 2: The Evolution of an XSEDE Supercomputer., , , , , , , , , and 1 other author(s). PEARC, page 15:1-15:8. ACM, (2017)Cross-Accelerator Performance Profiling., , , and . XSEDE, page 19:1-19:8. ACM, (2016)Are all scientific workloads equal?, and . IPCCC, page 284-290. IEEE, (1999)Virtual I/O scheduler: a scheduler of schedulers for performance virtualization., and . VEE, page 105-115. ACM, (2007)Issues Related to MIMD Shared-memory Computers: The NYU Ultracomputer Approach., , , , , , , and . ISCA, page 126-135. IEEE Computer Society, (1985)