Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of content copyright infringement in mobile application markets., , , and . eCrime, page 43-52. IEEE, (2015)Initial spatio-temporal domain expansion of the Modelfest database., , , , , , and . Human Vision and Electronic Imaging, volume 8651 of SPIE Proceedings, page 86510F. SPIE, (2013)Forced-Path Execution for Android Applications on x86 Platforms., and . SERE (Companion), page 188-197. IEEE, (2013)Top 10 FAIR Data & Software Things, , , , , , , , , and 45 other author(s). (February 2019)Continuous and automated measuring of compliance of hand-hygiene procedures using finite state machines and RFID., , and . IEEE Instrum. Meas. Mag., 15 (2): 8-12 (2012)TPC-E vs. TPC-C: characterizing the new TPC-E benchmark via an I/O comparison study., , , , , , and . SIGMOD Record, 39 (3): 5-10 (2010)Toward Scalable Transaction Processing., , , and . PVLDB, 6 (11): 1192-1193 (2013)Improving OLTP Scalability using Speculative Lock Inheritance., , and . PVLDB, 2 (1): 479-489 (2009)Processing Analytical Workloads Incrementally., , , , and . CoRR, (2015)Accelerating the Cloud with Heterogeneous Computing., , and . HotCloud, USENIX Association, (2011)