Get my own profile
Public access
View all21 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
Pierre RiteauStackHPCVerified email at stackhpc.com
Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
John RofranoSenior Technical Staff Member @ IBM ResearchVerified email at us.ibm.com
Jose FortesUniversity of FloridaVerified email at ufl.edu
Asit DanChief Architect, z Services API Management, IBMVerified email at us.ibm.com
Gabriel AntoniuSenior Research Scientist, Inria, IRISA, FranceVerified email at inria.fr
Steven TueckeUniversity of Chicago & Argonne National LaboratoryVerified email at uchicago.edu
Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
Bogdan NicolaeArgonne National LaboratoryVerified email at acm.org
Renato FigueiredoProfessor of Electrical and Computer Engineering, University of FloridaVerified email at acis.ufl.edu
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteVerified email at virginia.edu
Lois Curfman McInnesArgonne National LaboratoryVerified email at mcs.anl.gov
Gregor von LaszewskiUniversity of VirginiaVerified email at virginia.edu
Follow
Kate Keahey
Fellow at Computation Institute, University of Chicago and Scientist, Argonne National Laboratory
Verified email at mcs.anl.gov