Get my own profile
Public access
View all21 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
Pierre RiteauStackHPCVerified email at stackhpc.com
John RofranoSenior Technical Staff Member @ IBM ResearchVerified email at us.ibm.com
Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
Jose FortesUniversity of FloridaVerified email at ufl.edu
Asit DanChief Architect, z Services API Management, IBMVerified email at us.ibm.com
Gabriel AntoniuSenior Research Scientist, Inria, IRISA, FranceVerified email at inria.fr
Bogdan NicolaeArgonne National LaboratoryVerified email at acm.org
Steven TueckeUniversity of Chicago & Argonne National LaboratoryVerified email at uchicago.edu
Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
Renato FigueiredoProfessor of Electrical and Computer Engineering, University of FloridaVerified email at acis.ufl.edu
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
Geoffrey FoxProfessor of Computer Science, University of Virginia, Biocomplexity InstituteVerified email at virginia.edu
Gregor von LaszewskiUniversity of VirginiaVerified email at virginia.edu
Lois Curfman McInnesArgonne National LaboratoryVerified email at mcs.anl.gov
Follow![Kate Keahey](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=ocvPDcsAAAAJ&citpid=2)
Kate Keahey
Fellow at Computation Institute, University of Chicago and Scientist, Argonne National Laboratory
Verified email at mcs.anl.gov