Author of the publication

Concurrent Remembered Set Refinement in Generational Garbage Collection.

, , , and . Java Virtual Machine Research and Technology Symposium, page 13-26. USENIX, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JavaParty - portables paralleles und verteiltes Programmieren in Java., , and . Java-Informations-Tage, page 22-38. Springer, (1998)The Long-Short-Key Primitive and Its Applications to Key Security., , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 279-297. Springer, (2008)The Superdiversifier: Peephole Individualization for Software Protection., , , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 100-120. Springer, (2008)Attacking an Obfuscated Cipher by Injecting Faults., , and . Digital Rights Management Workshop, volume 2696 of Lecture Notes in Computer Science, page 16-31. Springer, (2002)Automated Data Augmentation Services Using Text Mining, Data Cleansing and Web Crawling Techniques., , , and . SERVICES I, page 136-143. IEEE Computer Society, (2008)Live-Manuskript - Ein Werkzeug zur kollaborativen Erstellung von Notizen und Mitschriften., , , , and . DeLFI, volume P-169 of LNI, page 75-79. GI, (2010)Concurrent Remembered Set Refinement in Generational Garbage Collection., , , and . Java Virtual Machine Research and Technology Symposium, page 13-26. USENIX, (2002)Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings., , and . MM&Sec, page 129-140. ACM, (2007)Performance Issues for Multi-language Java Applications., , , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 544-551. Springer, (2000)Cross-Architectural Performance Portability of a Java Virtual Machine Implementation., and . Java Virtual Machine Research and Technology Symposium, page 79-89. USENIX, (2002)