Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning dexterous grasps that generalise to novel objects by combining hand and contact models., , , , , and . ICRA, page 5358-5365. IEEE, (2014)FANTASY: fully automatic network emulation architecture with cross-layer support., , , , and . SimuTools, page 57-64. ICST/ACM, (2012)Improving Performance in Corruption-susceptible Networks.. AlgoSyn, page 25. Verlagshaus Mainz, Aachen, Germany, (2010)3D Registration for Verification of Humanoid Justin's Upper Body Kinematics., , and . CRV, page 276-283. IEEE Computer Society, (2012)Heuristic Header Error Recovery for Corrupted Network Packets.. RWTH Aachen University, Germany, (2015)Representation Learning for Resource Usage Prediction., , and . CoRR, (2018)Patient-individual morphological anomaly detection in multi-lead electrocardiography data streams., , , , and . BigData, page 3841-3846. IEEE Computer Society, (2017)Unikernels Everywhere: The Case for Elastic CDNs., , , , , , , , and . VEE, page 15-29. ACM, (2017)uniprof: A Unikernel Stack Profiler.. SIGCOMM Posters and Demos, page 31-33. ACM, (2017)My VM is Lighter (and Safer) than your Container., , , , , , , , and . SOSP, page 218-233. ACM, (2017)