Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and security challenges in the smart grid user domain.. IH&MMSec, page 85-86. ACM, (2013)Differentiable Electron Microscopy Simulation: Methods and Applications for Visualization., , , , , , and . CoRR, (2022)An analysis of privacy preservation in electric vehicle charging., , , , , and . Energy Inform., (2022)Spatially Guiding Unsupervised Semantic Segmentation Through Depth-Informed Feature Distillation and Sampling., , , and . CoRR, (2023)Leveraging Self-Supervised Vision Transformers for Neural Transfer Function Design., , and . CoRR, (2023)DID and VC: Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust., , , , and . ICBTA, page 61-66. ACM, (2020)Off-chain state channels in the energy domain., , , and . ISGT, page 1-5. IEEE, (2021)The role of user interaction and acceptance in a cloud-based demand response model., , and . IECON, page 4797-4802. IEEE, (2013)Influence of data granularity on nonintrusive appliance load monitoring., and . IH&MMSec, page 147-151. ACM, (2014)Property-Based Testing for Visualization Development., , , , and . VisGap@EuroVis, page 9-17. Eurographics Association, (2021)