Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection., , , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 398-424. Springer, (2022)Using a High-Level Test Generation Expert System for Testing In-Car Networks., , , and . DAC, page 134:1-134:6. ACM, (2014)A Framework for the Validation of Processor Architecture Compliance., , , , and . DAC, page 902-905. IEEE, (2007)Tile Tensors: A versatile data structure with descriptive shapes for homomorphic encryption., , , , , , , , and . CoRR, (2020)Information-Flow Models for Shared Memory with an Application to the PowerPC Architecture., , and . IEEE Trans. Parallel Distributed Syst., 14 (5): 502-515 (2003)Improving test quality through resource reallocation., , , and . HLDVT, page 64-69. IEEE Computer Society, (2001)DeepTrans - A Model-based Approach to Functional Verification of Address Translation Mechanisms., , , and . MTV, page 3-6. IEEE Computer Society, (2003)Advances in Simultaneous Multithreading Testcase Generation Methods., , , and . Haifa Verification Conference, volume 6504 of Lecture Notes in Computer Science, page 146-160. Springer, (2010)Reaching Coverage Closure in Post-silicon Validation., , , , and . Haifa Verification Conference, volume 6504 of Lecture Notes in Computer Science, page 60-75. Springer, (2010)Piparazzi: a test program generator for micro-architecture flow verification., , , and . HLDVT, page 23-28. IEEE Computer Society, (2003)