Author of the publication

Automated Derivation of ILP Implementations from SDL Specifications.

, , and . FORTE, volume 197 of IFIP Conference Proceedings, page 3-18. Kluwer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices., , , and . Computer Communications, 30 (7): 1487-1497 (2007)Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks., , and . The Journal of Supercomputing, 20 (2): 161-173 (2001)Wireless network security., , , , , and . Wireless Communications and Mobile Computing, (2006)Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering., and . Praxis der Informationsverarbeitung und Kommunikation, 22 (4): 197-203 (1999)Multi-channel support for preamble sampling MAC protocols in sensor networks., and . SoftCOM, page 149-153. IEEE, (2014)Design of a tailor-made memory protection unit for low power microcontrollers., , and . SIES, page 225-231. IEEE, (2013)Enhancing reliability of sensor networks by fine tuning their event observation behavior., and . WOWMOM, page 1-6. IEEE Computer Society, (2008)Comparison of EM Probes Using SEMA of an ECC Design., , and . NTMS, page 1-5. IEEE, (2016)Inherent Resistance of Efficient ECC Designs against SCA Attacks., , , and . NTMS, page 1-5. IEEE, (2016)Real-world deployments of sensor networks: Practical lessons for researchers., , and . Computer Communications, (2019)