Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event., , , , , , and . Internet Measurement Conference, page 255-270. ACM, (2016)One hierarchy spawns another: graph deconstructions and the complexity classification of conjunctive queries., and . CSL-LICS, page 32:1-32:10. ACM, (2014)nDEWS: A new domains early warning system for TLDs., , , and . NOMS, page 1061-1066. IEEE, (2016)Automating Resolution is NP-Hard., and . FOCS, page 498-509. IEEE Computer Society, (2019)Partially definable forcing and bounded arithmetic., and . Arch. Math. Log., 54 (1-2): 1-33 (2015)Saving Energy in Production Using Mobile Services., , , and . Software Engineering (Workshops), volume P-215 of LNI, page 355-361. GI, (2013)Under the Hood of DANE Mismanagement in SMTP., , , , , and . USENIX Security Symposium, page 1-16. USENIX Association, (2022)Parameterized Derandomization.. IWPEC, volume 5018 of Lecture Notes in Computer Science, page 148-159. Springer, (2008)Predicting Individual Well-Being in Teamwork Contexts Based on Speech Features., , , , and . Inf., 15 (4): 217 (April 2024)A New Remote Sensing Method to Estimate River to Ocean DOC Flux in Peatland Dominated Sarawak Coastal Regions, Borneo., , , , , , , , and . Remote. Sens., 12 (20): 3380 (2020)