Author of the publication

Group file operations for scalable tools and middleware.

, and . HiPC, page 69-78. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiapplication support in a parallel-program performance tool., and . IEEE Parallel Distributed Technol. Syst. Appl., 2 (1): 40-50 (1994)A Lightweight Library for Building Scalable Tools., , and . PARA (2), volume 7134 of Lecture Notes in Computer Science, page 419-429. Springer, (2010)Experiment Management Support for Performance Tuning., and . SC, page 8. ACM, (1997)On the Completeness of Attack Mutation Algorithms., , and . CSFW, page 43-56. IEEE Computer Society, (2006)Detecting Code Reuse Attacks with a Model of Conformant Program Execution., , , and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 1-18. Springer, (2014)How to Open a File and Not Get Hacked., and . ARES, page 1196-1203. IEEE Computer Society, (2008)Distributed Active Catalogs and Meta-Data Caching in Descriptive Name Services., and . ICDCS, page 120-129. IEEE Computer Society, (1993)Learning to Analyze Binary Computer Code., , , and . AAAI, page 798-804. AAAI Press, (2008)Typestate Checking of Machine Code., , and . ESOP, volume 2028 of Lecture Notes in Computer Science, page 335-351. Springer, (2001)A Security Attack and Defense in the Grid Environment.. PVM/MPI, volume 2474 of Lecture Notes in Computer Science, page 10. Springer, (2002)