Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phone Call Detection Based on Smartphone Sensor Data., and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 284-295. (2016)XenSocket: A High-Throughput Interdomain Transport for Virtual Machines., , , and . Middleware, volume 4834 of Lecture Notes in Computer Science, page 184-203. Springer, (2007)Lessons Learned: Building the Caernarvon High-Assurance Operating System., , , , and . IEEE Secur. Priv., 9 (1): 22-30 (2011)A robot as mobile sensor and agent in data center energy management., , , , , , and . ICAC, page 165-166. ACM, (2011)Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria Evaluations., , , , , and . ISSSE, (2006)Detection of in-progress phone calls using smartphone proximity and orientation sensors., , and . Int. J. Sens. Networks, 25 (2): 104-114 (2017)Towards data center self-diagnosis using a mobile robot., , , , , and . ICAC, page 81-90. ACM, (2011)Implementing a Domain-Independent Framework to Detect Suspicious Review Patterns., , , and . IEEE BigData, page 1687-1692. IEEE, (2019)The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System., , , , , , and . ISSRE, page 229-238. IEEE Computer Society, (2008)Big Data Analytics and Business Intelligence in Industry., , , and . Inf. Syst. Frontiers, 19 (6): 1229-1232 (2017)