Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. -Ing. Joachim Groß University of Stuttgart

Replication Data for: Transferable Anisotropic Mie Potential Force Field for Alkanediols, , , and . Dataset, (2024)Related to: Fleck, Maximilian; Darouich, Samir; Hansen, Niels; Gross, Joachim (2024): Transferable Anisotropic Mie Potential Force Field for Alkanediols. In: The Journal of Physical Chemistry B, 128, 4792-4801. doi: 10.1021/acs.jpcb.4c00962.
 

Other publications of authors with the same name

Design Issues in Secure Embedded Systems., , and . Embedded Systems Design and Verification, CRC Press, (2009)A Comparison of TERO and RO Timing Sensitivity for Hardware Trojan Detection Applications., and . DSD, page 547-550. IEEE Computer Society, (2015)TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach., , , , and . QRS, page 69-73. IEEE, (2016)Active hardware attacks and proactive countermeasures., and . ISCC, page 361-366. IEEE Computer Society, (2002)A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud., , , , , and . WF-IoT, page 13-18. IEEE, (2018)Pulse: A Class of Super-Worms against Network Infrastructure., and . ICDCS Workshops, page 28-. IEEE Computer Society, (2003)Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis., , and . CS2@HiPEAC, page 13-18. ACM, (2015)Design and implementation of an efficient integer count sort in CUDA GPUs., , , and . Concurrency and Computation: Practice and Experience, 23 (18): 2365-2381 (2011)DAPHNE: A Disruption-Tolerant Application Proxy for e-Health Network Environments., and . MobiHealth, volume 61 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 88-95. Springer, (2012)Combinatorial Methods in Security Testing., , , and . IEEE Computer, 49 (10): 80-83 (2016)