Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting Kernelized Locality-Sensitive Hashing for Improved Large-Scale Image Retrieval., , and . CoRR, (2014)Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective., , , , , and . HPCC/CSS/ICESS, page 700-705. IEEE, (2015)Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems., , , , and . IPDPS Workshops, page 741-750. IEEE, (2013)Energy-Aware Design of Stochastic Applications With Statistical Deadline and Reliability Guarantees., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 38 (8): 1413-1426 (2019)A Formally Verified Buddy Memory Allocation Model., , , , and . ICECCS, page 144-153. IEEE, (2019)Optimization of secure embedded systems with dynamic task sets., , and . DATE, page 1765-1770. EDA Consortium San Jose, CA, USA / ACM DL, (2013)An Executable UML with OCL-based Action Semantics Language., , and . APSEC, page 302-309. IEEE Computer Society, (2007)Using coherencies to examine network evolution and co-evolution., , and . Social Netw. Analys. Mining, 5 (1): 53:1-53:11 (2015)Combinatorial Topic Models using Small-Variance Asymptotics., , and . CoRR, (2016)Using OCL in Executable UML., , and . ECEASST, (2008)