Get my own profile
Public access
View all66 articles
15 articles
available
not available
Based on funding mandates
Co-authors
William GroppProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Ewing (Rusty) LuskArgonne National LaboratoryVerified email at mcs.anl.gov
Ron BrightwellSandia National LaboratoriesVerified email at sandia.gov
Richard BrooksProfessor, Computer Engineering, Clemson UniversityVerified email at acm.org
Lu YuThe Holcombe Department of Electrical and Computer Engineering, Clemson UniversityVerified email at clemson.edu
Lee WardVerified email at sandia.gov
Ryan E. GrantQueen's UniversityVerified email at queensu.ca
Manfred MorariElectrical and Systems Engineering, U. of PennsylvaniaVerified email at seas.upenn.edu
Daniel J. HolmesIntel CorporationVerified email at intel.com
Gary WarnerDirector of Research in Computer Forensics, University of Alabama at BirminghamVerified email at uab.edu
Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteVerified email at virginia.edu
Robert FalgoutLawrence Livermore National LaboratoryVerified email at llnl.gov
Jeff GrayU. of Alabama Distinguished Professor, Computer Science; Director, Randall Research ScholarsVerified email at cs.ua.edu
Glenn JuddVerified email at cs.cmu.edu
Vladimir GetovUniversity of WestminsterVerified email at westminster.ac.uk
Bryan CarpenterSenior lecturer, School of Computing, University of PortsmouthVerified email at port.ac.uk
Patrick G. BridgesScalable Systems Laboratory, Department of Computer Science, University of New MexicoVerified email at cs.unm.edu
Amin HassaniPhD. Candidate, University of Alabama at BirminghamVerified email at cis.uab.edu