Author of the publication

Securing Wireless Networks in a University Environment.

, , and . PerCom Workshops, page 312-316. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't care words with an application to the automata-based approach for real addition., and . Formal Methods in System Design, 33 (1-3): 85-115 (2008)Formal Verification of an Arbiter Circuit., , and . ASYNC, page 165-175. IEEE Computer Society, (2010)Mechanizing the Powerset Construction for Restricted Classes of omega -Automata., , and . ATVA, volume 4762 of Lecture Notes in Computer Science, page 223-236. Springer, (2007)Automatenbasierte Entscheidungsverfahren für Theorien der Logik erster Stufe mit Addition.. University of Freiburg, (2009)Don't Care Words with an Application to the Automata-Based Approach for Real Addition., and . CAV, volume 4144 of Lecture Notes in Computer Science, page 67-80. Springer, (2006)Cross-component garbage collection., , , , , and . Proc. ACM Program. Lang., 2 (OOPSLA): 151:1-151:24 (2018)Automatic Identification of Timing Anomalies for Cycle-Accurate Worst-Case Execution Time Analysis., , , , , and . DDECS, page 15-20. IEEE Computer Society, (2006)Idle time garbage collection scheduling., , , , and . PLDI, page 570-583. ACM, (2016)Upper Bounds on the Automata Size for Integer and Mixed Real and Integer Linear Arithmetic (Extended Abstract).. CSL, volume 5213 of Lecture Notes in Computer Science, page 431-445. Springer, (2008)A Definition and Classification of Timing Anomalies., , , , , , and . WCET, volume 4 of OASIcs, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)