Author of the publication

Deep packet inspection with DFA-trees and parametrized language overapproximation.

, , , and . INFOCOM, page 531-539. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.

Daniel Klötzl University of Stuttgart

NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)
NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)Constrained Dynamic Mode Decomposition, , , and . IEEE Transactions on Visualization and Computer Graphics, (2022)
 

Other publications of authors with the same name

Automatic partial loop summarization in dynamic test generation., and . ISSTA, page 23-33. ACM, (2011)Speculative Parallel Pattern Matching., , , and . IEEE Trans. Information Forensics and Security, 6 (2): 438-451 (2011)Composite Constant Propagation and its Application to Android Program Analysis., , , and . IEEE Trans. Software Eng., 42 (11): 999-1014 (2016)Deep packet inspection with DFA-trees and parametrized language overapproximation., , , and . INFOCOM, page 531-539. IEEE, (2014)Composite Constant Propagation: Application to Android Inter-Component Communication Analysis., , , , and . ICSE (1), page 77-88. IEEE Computer Society, (2015)Using Cell Processors for Intrusion Detection through Regular Expression Matching with Speculation., , , and . CISIS, page 203-210. IEEE Computer Society, (2011)LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes., , , , and . USENIX Security Symposium, page 877-891. USENIX Association, (2014)Formatted Encryption Beyond Regular Languages., , , and . ACM Conference on Computer and Communications Security, page 1292-1303. ACM, (2014)Multi-byte Regular Expression Matching with Speculation., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 284-303. Springer, (2009)