Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aserbaidschan – Ressourcen, Konflikt(e), Transformationen, and . Materialen und Diskussionsgrundlagen des Faches Wirtschaftsgeographie Katholische Universität Eichstätt-Ingolstadt, (2014)Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving., and . CoRR, (2017)Future developments in cyber risk assessment for the internet of things., , , , , , and . CoRR, (2018)Artificial Intelligence and the Internet of Things in Industry 4.0., , , , and . CCF Trans. Pervasive Comput. Interact., 3 (3): 329-338 (2021)Mapping the values of IoT., , , and . J. Inf. Technol., 33 (4): 345-360 (2018)On model checking multiple hybrid views., and . Theor. Comput. Sci., 404 (3): 186-201 (2008)Static Analysis for Proactive Security., and . Computing and Software Science, volume 10000 of Lecture Notes in Computer Science, Springer, (2019)Polynomial-Time Under-Approximation of Winning Regions in Parity Games., , and . MFCSIT, volume 225 of Electronic Notes in Theoretical Computer Science, page 115-139. Elsevier, (2006)Quantitative Analysis and Model Checking., and . LICS, page 111-122. IEEE Computer Society, (1997)A simple and expressive semantic framework for policy composition in access control., , and . FMSE, page 12-21. ACM, (2007)