Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The comparison between nonlinear and linear preconditioning JFNK method for transient neutronics/thermal-hydraulics coupling problem, , , , , and . Annals of Nuclear Energy, (2019)Efficient Compactions between Storage Tiers with PrismDB., , , and . ASPLOS (3), page 179-193. ACM, (2023)Continuous Error Timing in Automation: The Peak-End Effect on Human-Automation Trust., , , and . Int. J. Hum. Comput. Interact., 40 (8): 1832-1844 (April 2024)Topology optimisation and customisation of a prosthetic knee joint design., and . Int. J. Computer Integrated Manufacturing, 26 (10): 968-976 (2013)Minimise joint clearance in rapid fabrication of non-assembly mechanisms., and . Int. J. Computer Integrated Manufacturing, 24 (8): 726-734 (2011)TimeCloth: Fast Point-in-Time Database Recovery in The Cloud., , , , , , and . SIGMOD Conference Companion, page 214-226. ACM, (2024)Evaluating Anti-Fingerprinting Privacy Enhancing Technologies., , and . WWW, page 351-362. ACM, (2019)The Effectiveness of Privacy Enhancing Technologies against Fingerprinting., , and . CoRR, (2018)Practical Volume-Based Attacks on Encrypted Databases., , , and . EuroS&P, page 354-369. IEEE, (2020)Reconstruction-Based One-Class Classification Anomaly Detection for Tabular Data., , and . ISICA, volume 1590 of Communications in Computer and Information Science, page 313-326. Springer, (2021)