Get my own profile
Public access
View all27 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
Pierre RiteauStackHPCVerified email at stackhpc.com
John RofranoSenior Technical Staff Member @ IBM ResearchVerified email at us.ibm.com
Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
Jose FortesUniversity of FloridaVerified email at ufl.edu
Asit DanChief Architect, z Services API Management, IBMVerified email at us.ibm.com
Gabriel AntoniuSenior Research Scientist, Inria, IRISA, FranceVerified email at inria.fr
Bogdan NicolaeArgonne National LaboratoryVerified email at acm.org
Steven TueckeUniversity of Chicago & Argonne National LaboratoryVerified email at uchicago.edu
Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
Renato FigueiredoProfessor, Electrical Engineering and Computer Science, Oregon State UniversityVerified email at oregonstate.edu
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteVerified email at virginia.edu
Gregor von LaszewskiUniversity of VirginiaVerified email at virginia.edu
Lois Curfman McInnesArgonne National LaboratoryVerified email at mcs.anl.gov
Follow
Kate Keahey
Fellow at Computation Institute, University of Chicago and Scientist, Argonne National Laboratory
Verified email at mcs.anl.gov