Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Daniel Kempf University of Stuttgart

GALÆXI Application: NASA Rotor 37, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.
GALÆXI Application: NASA Rotor 37, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.GALÆXI Verification: Convergence Tests, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.GALÆXI Validation: Taylor-Green Vortex, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.
 

Other publications of authors with the same name

Assessing Information Security Risk Using Markov Chain., , , , and . IEEM, page 808-813. IEEE, (2018)Punctuation Normalisation for Cleaner Treebanks and Parsers., and . ALTA, page 151-159. Australasian Language Technology Association, (2008)Two-factor Protection Scheme in Securing the Source Code of Android Applications., , , , , and . BCS International IT Conferenc, (2014)Research on Information Security Perception of Sina Weibo Users Based on KISCAP Model., , , , and . TrustCom/BigDataSE, page 1584-1588. IEEE, (2018)The Computable News project: Research in the Newsroom., , , , , , , , , and 1 other author(s). WWW (Companion Volume), page 903-908. ACM, (2015)SYDNEY CMCRC at TAC 2013., , , , , , and . TAC, NIST, (2013)(Almost) Total Recall - SYDNEY CMCRC at TAC 2012., , , , , , and . TAC, NIST, (2012)Strategies in Improving Android Security., , , , , and . PACIS, page 275. (2014)The Challenges of Parsing Chinese with Combinatory Categorial Grammar., and . HLT-NAACL, page 295-304. The Association for Computational Linguistics, (2012)Robust Password-keeping System Using Block-chain Technology., , , and . IEEM, page 1221-1225. IEEE, (2018)