Get my own profile
Public access
View all24 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
- Pierre RiteauStackHPCVerified email at stackhpc.com
- John RofranoSenior Technical Staff Member @ IBM ResearchVerified email at us.ibm.com
- Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
- Jose FortesUniversity of FloridaVerified email at ufl.edu
- Asit DanChief Architect, z Services API Management, IBMVerified email at us.ibm.com
- Gabriel AntoniuSenior Research Scientist, Inria, IRISA, FranceVerified email at inria.fr
- Bogdan NicolaeArgonne National LaboratoryVerified email at acm.org
- Steven TueckeUniversity of Chicago & Argonne National LaboratoryVerified email at uchicago.edu
- Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
- Renato FigueiredoProfessor, Electrical Engineering and Computer Science, Oregon State UniversityVerified email at oregonstate.edu
- Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
- Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteVerified email at virginia.edu
- Gregor von LaszewskiUniversity of VirginiaVerified email at virginia.edu
- Lois Curfman McInnesArgonne National LaboratoryVerified email at mcs.anl.gov
Follow
Kate Keahey
Fellow at Computation Institute, University of Chicago and Scientist, Argonne National Laboratory
Verified email at mcs.anl.gov