Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. Michael Böhm University of Stuttgart

Multi-Stage Optimization for Long-Term Building Climate Operation with Seasonal Thermal Storage, , and . 2023 IEEE 19th International Conference on Automation Science and Engineering (CASE), IEEE, (2023)

Univ. -Prof. Dr. Michael Pradel University of Stuttgart

That’s a Tough Call : Studying the Challenges of Call Graph Construction for WebAssembly, , , and . ISSTA 2023 : Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, page 892-903. New York, Association for Computing Machinery, (2023)
That’s a Tough Call : Studying the Challenges of Call Graph Construction for WebAssembly, , , and . ISSTA 2023 : Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, page 892-903. New York, Association for Computing Machinery, (2023)Beware of the Unexpected : Bimodal Taint Analysis, , and . ISSTA 2023 : Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, page 211-222. New York, Association for Computing Machinery, (2023)
 

Other publications of authors with the same name

Verifying computations without reexecuting them: from theoretical possibility to near-practicality., and . Electronic Colloquium on Computational Complexity (ECCC), (2013)Harmful devices considered harmless., , , , , and . CoRR, (2015)Depot: Cloud Storage with Minimal Trust., , , , , , and . ACM Trans. Comput. Syst., 29 (4): 12:1-12:38 (2011)Verifying computations without reexecuting them., and . Commun. ACM, 58 (2): 74-84 (2015)Verifiable ASICs., , , , and . IEEE Symposium on Security and Privacy, page 759-778. IEEE Computer Society, (2016)Taking Proof-Based Verified Computation a Few Steps Closer to Practicality., , , , , and . USENIX Security Symposium, page 253-268. USENIX Association, (2012)Detecting failures in distributed systems with the Falcon spy network., , , , and . SOSP, page 279-294. ACM, (2011)Repair from a Chair: Computer Repair as an Untrusted Cloud Service., , , and . HotOS, USENIX Association, (2011)Depot: Cloud Storage with Minimal Trust., , , , , , and . OSDI, page 307-322. USENIX Association, (2010)Efficient RAM and control flow in verifiable outsourced computation., , , , and . NDSS, The Internet Society, (2015)