Author of the publication

Biomechanical Model-Based Development of an Active Occupational Upper-Limb Exoskeleton to Support Healthcare Workers in the Surgery Waiting Room

, , , , , and . International Journal of Environmental Research and Public Health 17 (14): 5140 (July 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A class of polynomially solvable range constraints for interval analysis without widenings., and . Theor. Comput. Sci. 345 (1): 122-138 (2005)Joe-E: A Security-Oriented Subset of Java., , and . NDSS, The Internet Society, (2010)A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities., , , and . NDSS, The Internet Society, (2000)Detecting Format String Vulnerabilities with Type Qualifiers., , , and . USENIX Security Symposium, USENIX, (2001)Timing Analysis of Keystrokes and Timing Attacks on SSH., , and . USENIX Security Symposium, USENIX, (2001)A graph approach to quantitative analysis of control-flow obfuscating transformations., , and . IEEE Trans. Information Forensics and Security 4 (2): 257-267 (2009)Evidence-Based Elections., and . IEEE Security & Privacy 10 (5): 33-41 (2012)A Secure Environment for Untrusted Helper Applications., , , and . USENIX Security Symposium, USENIX Association, (1996)Hidden Voice Commands., , , , , , , and . USENIX Security Symposium, page 513-530. USENIX Association, (2016)Fault Attacks on Dual-Rail Encoded Systems., and . ACSAC, page 483-494. IEEE Computer Society, (2005)