Author of the publication

Improving Performance in Corruption-susceptible Networks.

. AlgoSyn, page 25. Verlagshaus Mainz, Aachen, Germany, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Performance in Corruption-susceptible Networks.. AlgoSyn, page 25. Verlagshaus Mainz, Aachen, Germany, (2010)3D Registration for Verification of Humanoid Justin's Upper Body Kinematics., , and . CRV, page 276-283. IEEE Computer Society, (2012)Representation Learning for Resource Usage Prediction., , and . CoRR, (2018)Patient-individual morphological anomaly detection in multi-lead electrocardiography data streams., , , , and . BigData, page 3841-3846. IEEE Computer Society, (2017)Unikernels Everywhere: The Case for Elastic CDNs., , , , , , , , and . VEE, page 15-29. ACM, (2017)uniprof: A Unikernel Stack Profiler.. SIGCOMM Posters and Demos, page 31-33. ACM, (2017)My VM is Lighter (and Safer) than your Container., , , , , , , , and . SOSP, page 218-233. ACM, (2017)Learning dexterous grasps that generalise to novel objects by combining hand and contact models., , , , , and . ICRA, page 5358-5365. IEEE, (2014)FANTASY: fully automatic network emulation architecture with cross-layer support., , , , and . SimuTools, page 57-64. ICST/ACM, (2012)Object-centered hybrid reasoning for whole-body mobile manipulation., , , , and . ICRA, page 1828-1835. IEEE, (2014)