Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gropius - A Tool for Managing Cross-component Issues., , and . ECSA Companion, volume 1269 of Communications in Computer and Information Science, page 82-94. Springer, (2020)Transactional execution of hierarchical reconfigurations in cyber-physical systems., , and . Softw. Syst. Model., 18 (1): 157-189 (2019)Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights., , , , , , , and . ASP-DAC, page 104-111. ACM, (2019)Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights., , , , , , and . CoRR, (2019)Project Deliverable D6.1: Method and Abstract Workflow, , , , , , , , , and 2 other author(s). (November 2010)The Impact of Software Component Adaptation on Quality of Service Properties., and . L'OBJET, 12 (1): 105-125 (2006)Performance-Related Metrics in the ISO 9126 Standard.. Dependability Metrics, volume 4909 of Lecture Notes in Computer Science, page 204-206. Springer, (2005)A Survey on the Relevance of the Performance of Model Transformations., , , , , , and . J. Object Technol., 20 (2): 1-27 (2021)Parametric Performance Completions for Model-Driven Performance Prediction, , , , and . Performance Evaluation, (2009)Accepted for publication in 2009.Hardware-Trojaner., , , , and . Datenschutz und Datensicherheit, 44 (7): 446-450 (2020)