Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topic 8 Distributed Systems and Algorithms., , , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 549. Springer, (2007)Improving Program Correctness with Atomic Exception Handling., and . J. Univers. Comput. Sci., 13 (8): 1047-1072 (2007)Capacity planning for dependable services., , , , , and . Theor. Comput. Sci., (October 2023)Vallum-Med: Protecting Medical Data in Cloud Environments., , , , , and . CIKM, page 3397-3400. ACM, (2020)Rearchitecting DNS., , and . IICS, volume P-165 of LNI, page 397-408. GI, (2010)SpecFuzz: Bringing Spectre-type vulnerabilities to the surface., , , and . USENIX Security Symposium, page 1481-1498. USENIX Association, (2020)A Sorted Datalog Hammer for Supervisor Verification Conditions Modulo Simple Linear Arithmetic., , , , , , , , and . TACAS (1), volume 13243 of Lecture Notes in Computer Science, page 480-501. Springer, (2022)Active replication for latency-sensitive stream processing in Apache Flink., , , , , and . SRDS, page 56-66. IEEE, (2021)LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous Computing., , , , , , , , , and 33 other author(s). DATE, page 169-174. IEEE, (2020)ControlFreak: Signature Chaining to Counter Control Flow Attacks., and . SRDS, page 84-93. IEEE Computer Society, (2015)