Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A file system bypassing volatile main memory: towards a single-level persistent store., , , and . CF, page 97-104. ACM, (2018)BERT: BEhavioral Regression Testing., and . WODA, page 36-42. ACM, (2008)How to Break EAP-MD5., and . WISTP, volume 7322 of Lecture Notes in Computer Science, page 49-57. Springer, (2012)Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling., and . JSSPP, volume 3834 of Lecture Notes in Computer Science, page 219-237. Springer, (2005)Modeling and simulation on the contact deformation distributionin a wire race ball bearing., , , and . ROBIO, page 2211-2214. IEEE, (2009)Approximate Top-k Structural Similarity Search over XML Documents., , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 319-330. Springer, (2006)Grading-Based Test Suite Augmentation., , , , and . ASE, page 226-229. IEEE, (2019)Browser-based software for technology transfer., , , , , and . SAICSIT, page 338-340. ACM, (2011)Breaking H2-MAC Using Birthday Paradox., , and . IACR Cryptology ePrint Archive, (2011)Fast Collision Attack on MD5., , and . IACR Cryptology ePrint Archive, (2013)