Author of the publication

Stack Size Analysis for Interrupt-Driven Programs.

, , , , , and . SAS, volume 2694 of Lecture Notes in Computer Science, page 109-126. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing., , , , , and . IEEE Internet Things J., 11 (2): 1893-1909 (January 2024)Broadcast based on layered diffusion in wireless ad hoc and sensor networks., , and . Wirel. Commun. Mob. Comput., 12 (1): 99-115 (2012)CGMOS: Certainty Guided Minority OverSampling., , , , and . CIKM, page 1623-1631. ACM, (2016)A Physical and SPICE-Compatible Model for the MOS Depletion Device.. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 4 (3): 349-356 (1985)A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks., , , , and . IEEE Access, (2020)Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols., , , , , and . Peer-to-Peer Netw. Appl., 15 (1): 304-323 (2022)Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing., , , and . IEEE Trans. Dependable Secur. Comput., 10 (2): 57-69 (2013)A novel approach toward source-to-sink distance estimation in wireless sensor networks., , , and . IEEE Commun. Lett., 14 (5): 384-386 (2010)Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext., , , and . AsiaCCS, page 191-202. ACM, (2015)Lecture video indexing using boosted margin maximizing neural networks., , , and . CoRR, (2017)