Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Torsten HoeflerProfessor of Computer Science at ETH ZurichEmail verificata su inf.ethz.ch
- Tal Ben-NunLawrence Livermore National LaboratoryEmail verificata su llnl.gov
- Marc SnirUniversity of Illinois at Urbana ChamapignEmail verificata su illinois.edu
- Naoya MaruyamaLawrence Livermore National LaboratoryEmail verificata su acm.org
- Shigang LiProfessor, Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Hoang-Vu DangUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Alex BrooksUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Brian Van EssenLawrence Livermore National LaboratoryEmail verificata su llnl.gov
- Dan AlistarhIST AustriaEmail verificata su ist.ac.at
- Ivanov AndreiСанкт-Петербургский государственный университет, Высшая школа менеджмента, кафедра государственногоEmail verificata su gsom.spbu.ru
- Peter DuebenRoyal Society University Research Fellow at the European Weather Centre (ECMWF)Email verificata su ecmwf.int
- Saleh AshkboosETH ZurichEmail verificata su inf.ethz.ch
- Keshav PingaliProfessor of Computer Science, The University of Texas at AustinEmail verificata su cs.utexas.edu
- Roshan DathathriSenior Researcher, Microsoft ResearchEmail verificata su microsoft.com
- Gurbinder GillCo-Founder at StealthEmail verificata su corvic.ai
- Lukas GianinazziETH ZurichEmail verificata su inf.ethz.ch
- Peter GrönquistResearch Software Engineer - EPFLEmail verificata su ethz.ch
- Maciej BestaETH ZurichEmail verificata su inf.ethz.ch
- Bryan A. PlummerAssistant Professor, Boston UniversityEmail verificata su bu.edu
- Kate SaenkoBoston UniversityEmail verificata su bu.edu