Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Performance in Corruption-susceptible Networks.. AlgoSyn, page 25. Verlagshaus Mainz, Aachen, Germany, (2010)3D Registration for Verification of Humanoid Justin's Upper Body Kinematics., , and . CRV, page 276-283. IEEE Computer Society, (2012)FANTASY: fully automatic network emulation architecture with cross-layer support., , , , and . SimuTools, page 57-64. ICST/ACM, (2012)Learning dexterous grasps that generalise to novel objects by combining hand and contact models., , , , , and . ICRA, page 5358-5365. IEEE, (2014)Representation Learning for Resource Usage Prediction., , and . CoRR, (2018)Heuristic Header Error Recovery for Corrupted Network Packets.. RWTH Aachen University, Germany, (2015)Patient-individual morphological anomaly detection in multi-lead electrocardiography data streams., , , , and . BigData, page 3841-3846. IEEE Computer Society, (2017)Unikernels Everywhere: The Case for Elastic CDNs., , , , , , , , and . VEE, page 15-29. ACM, (2017)uniprof: A Unikernel Stack Profiler.. SIGCOMM Posters and Demos, page 31-33. ACM, (2017)My VM is Lighter (and Safer) than your Container., , , , , , , , and . SOSP, page 218-233. ACM, (2017)