Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Improve Physical Activity by Generating Individual Implementation Intentions., , , and . UMAP (Adjunct Publication), page 370-375. ACM, (2017)Correctness Witness Validation by Abstract Interpretation., , , , , and . CoRR, (2023)Signalling Preferences in Interviewing Markets., and . Computational Social Systems and the Internet, volume 07271 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Specfuscator: Evaluating Branch Removal as a Spectre Mitigation., , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 293-310. Springer, (2021)Speculative Dereferencing: Reviving Foreshadow., , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 311-330. Springer, (2021)Neue Techniken - neue Arbeitspolitik?, and . Untersuchungen des Instituts zur Erforschung sozialer Chancen (ISO), Köln Campus-Verl., Frankfurt/Main u.a., (1989)Umweltschutz im Betriebsalltag, and . Studien zur Sozialwissenschaft Westdt. Verl., Opladen, (1994)Efficient real-time shadows., , , , and . SIGGRAPH Courses, page 18:1-18:53. ACM, (2012)LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection., , , , , , , , , and . SP, page 54-72. IEEE, (2020)A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs., , , and . SP, page 2321-2338. IEEE, (2023)