Author:
Hoefler Torsten,Hendel Ariel,Roweth Duncan
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Reference22 articles.
1. Cost-effective diameter-two topologies
2. ReDMArk: Bypassing RDMA security mechanisms;rothenberger;Proc Usenix Security Symp,0
3. sRDMA – Efficient NIC-based authentication and encryption for remote direct memory access;taranov;Proc USENIX Annu Tech Conf,0
4. Mitigating network noise on Dragonfly networks through application-aware routing
5. The Case of the Missing Supercomputer Performance
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献