Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Transparency for Deeply Embedded Programs., , , and . ACM Trans. Archit. Code Optim., 14 (1): 8:1-8:26 (2017)Modeling and visualizing networked multi-core embedded software energy consumption., and . CoRR, (2015)Energy Modeling of Software for a Hardware Multithreaded Embedded Microprocessor., and . ACM Trans. Embed. Comput. Syst., 14 (3): 56:1-56:25 (2015)A Benes Based NoC Switching Architecture for Mixed Criticality Embedded Systems., , and . MCSoC, page 125-132. IEEE Computer Society, (2016)A software controlled voltage tuning system using multi-purpose ring oscillators., and . CoRR, (2015)Inferring Parametric Energy Consumption Functions at Different Software Levels: ISA vs. LLVM IR., , , , , , and . FOPARA, volume 9964 of Lecture Notes in Computer Science, page 81-100. (2015)Overview of Swallow - A Scalable 480-core System for Investigating the Performance and Energy Efficiency of Many-core Applications and Operating Systems., and . CoRR, (2015)Energy Transparency for Deeply Embedded Programs., , , and . CoRR, (2016)On the Value and Limits of Multi-level Energy Consumption Static Analysis for Deeply Embedded Single and Multi-threaded Programs., , and . CoRR, (2015)IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks.. iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 107-112. IEEE, (2022)