Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)., , , and . Dagstuhl Reports, 9 (8): 1-25 (2019)Formal virtualization requirements for the ARM architecture., , , , and . J. Syst. Archit., 59 (3): 144-154 (2013)An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors., , , , , , and . J. Signal Process. Syst., 61 (2): 157-179 (2010)A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays., and . ACM Trans. Archit. Code Optim., 13 (2): 15:1-15:26 (2016)Effective Extensible Programming: Unleashing Julia on GPUs., , and . IEEE Trans. Parallel Distributed Syst., 30 (4): 827-841 (2019)Extended Report on the Obfuscated Integration of Software Protections., , and . CoRR, (2019)Coarse-Grained Reconfigurable Array Architectures., , and . Handbook of Signal Processing Systems, Springer, (2013)Bidirectional liveness analysis, or how less than half of the Alpha's registers are used., , and . J. Syst. Archit., 52 (10): 535-548 (2006)Protecting Your Software Updates., , and . IEEE Secur. Priv., 11 (2): 47-54 (2013)$\Delta$ΔBreakpad: Diversified Binary Crash Reporting., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (4): 841-856 (2020)