Author of the publication

Explanation of micro lead generation in external cylindrical plunge grinding of radial shaft sealing counterfaces

, , , , and . CIRP Journal of Manufacturing Science and Technology, (2025)764 (peer-review).
DOI: https://doi.org/10.1016/j.cirpj.2025.01.001

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A case study in distributed planning for autonomous cooperating agents.. University of Kaiserslautern, Germany, (1991)Explanation of micro lead generation in external cylindrical plunge grinding of radial shaft sealing counterfaces, , , , and . CIRP Journal of Manufacturing Science and Technology, (2025)764 (peer-review).Aufmerksamkeitszentrierte Gestaltung von Benutzeroberflächen.. University of Marburg, Germany, (1989)A formal nethod (a networked formal method)., and . ISSE, 6 (4): 255-268 (2010)A semantic model for VHDL-AMS., , and . CHARME, volume 105 of IFIP Conference Proceedings, page 106-123. Chapman & Hall, (1997)Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source., , and . SEW, page 223-233. IEEE Computer Society, (2006)Towards Proving RISC Machine Code not Risky with respect to Memory Aliasing, and . CoRR, (2013)Checking for Deadlock, Double-Free and Other Abuses in the Linux Kernel Source Code., and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 765-772. Springer, (2006)Z! in Progress: Maintaining Z Specifications.. Z User Workshop, page 295-318. Springer, (1990)Superscalar Encrypted RISC: The Measure of a Secret Computer., , , and . TrustCom/BigDataSE, page 1336-1341. IEEE, (2018)