Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Tim CockerillUniversity of TexasVerified email at tacc.utexas.edu
- Andrew GrimshawUniversity of VirginiaVerified email at virginia.edu
- Nancy Wilkins-DiehrSan Diego Supercomputer CenterVerified email at sdsc.edu
- Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
- Gregory D. PetersonUniversity of TennesseeVerified email at utk.edu
- Edward SeidelPresident, University of WyomingVerified email at uwyo.edu
- Joan MassóCatedrático de Física Teórica, Universitat de les Illes BalearsVerified email at uib.es
- David L HartNational Center for Atmospheric ResearchVerified email at ucar.edu
- Gregor von LaszewskiUniversity of VirginiaVerified email at virginia.edu
- Steve GalloCenter for Computational Research, University At BuffaloVerified email at ccr.buffalo.edu
- Abani PatraProfessor Mathematics and Computer ScienceVerified email at tufts.edu
- Daniel S. KatzNCSA, CS, ECE, iSchool @ UIUCVerified email at illinois.edu
- Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
- Amit MajumdarDivision Director, San Diego Supercomputer CenterVerified email at sdsc.edu
- Miron LivnyProfessor of Computer Science, University of wisconsin-MadisonVerified email at cs.wisc.edu
- Malcolm TobiasWashington University of St. LouisVerified email at wustl.edu
- Amit ChourasiaSan Diego Supercomputer Center, UC San DiegoVerified email at sdsc.edu
- Barry I. SchneiderDivision of Applied and Computational Mathematics, NISTVerified email at nist.gov
- Thomas FinholtProfessor of Information, School of Information, University of MichiganVerified email at umich.edu