Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Tim CockerillUniversity of TexasVerified email at tacc.utexas.edu
Andrew GrimshawUniversity of VirginiaVerified email at virginia.edu
Nancy Wilkins-DiehrSan Diego Supercomputer CenterVerified email at sdsc.edu
Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
Gregory D. PetersonUniversity of TennesseeVerified email at utk.edu
Edward SeidelPresident, University of WyomingVerified email at uwyo.edu
Joan MassóCatedrático de Física Teórica, Universitat de les Illes BalearsVerified email at uib.es
David L HartNational Center for Atmospheric ResearchVerified email at ucar.edu
Gregor von LaszewskiUniversity of VirginiaVerified email at virginia.edu
Steve GalloCenter for Computational Research, University At BuffaloVerified email at ccr.buffalo.edu
Abani PatraProfessor Mathematics and Computer ScienceVerified email at tufts.edu
Daniel S. KatzNCSA, CS, ECE, iSchool @ UIUCVerified email at illinois.edu
Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
Amit MajumdarDivision Director, San Diego Supercomputer CenterVerified email at sdsc.edu
Miron LivnyProfessor of Computer Science, University of wisconsin-MadisonVerified email at cs.wisc.edu
Malcolm TobiasWashington University of St. LouisVerified email at wustl.edu
Amit ChourasiaSan Diego Supercomputer Center, UC San DiegoVerified email at sdsc.edu
Barry I. SchneiderDivision of Applied and Computational Mathematics, NISTVerified email at nist.gov
Thomas FinholtProfessor of Information, School of Information, University of MichiganVerified email at umich.edu