From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Linking Threat Avoidance and Security Adoption: A Theoretical Model For SMEs., , и . Bled eConference, стр. 35. (2015)Handlungsempfehlungen, , , , , , , , , и 5 other автор(ы). Management sicherer Cloud-Services, (2018)Explaining the Impact of Cloud Assurance Seals on Customers' Perceived Privacy., , и . ECIS, стр. 62. (2018)Heterogeneous Memory and Arena-Based Heap Allocation., , , и . MCHPC@SC, стр. 67-71. ACM, (2018)Towards Scalable Distributed Workload Manager with Monitoring-Based Weakly Consistent Resource Stealing., , , , , и . HPDC, стр. 219-222. ACM, (2015)Assistive Systems: A Paradigm Shift in Technology and Medical Care., , и . IMC, том 53 из Communications in Computer and Information Science, стр. 1-11. (2009)On the Performance and Technological Impact of Adding Memory Controllers in Multi-Core Processors., , и . Parallel Process. Lett., 20 (4): 341-357 (2010)Optimizing process creation and execution on multi-core architectures., , , и . Int. J. High Perform. Comput. Appl., 27 (2): 147-161 (2013)The Influence of Control Mechanisms on Cloud Sourcing Decisions (Der Einfluss von Kontrollmechanismen auf Cloud-Sourcing-Entscheidungen). Technical University of Munich, Germany, (2019)Topology-Aware Event Sequence Mining for Understanding HPC System Behavior and Detecting Anomalies., , , и . HPCC/SmartCity/DSS, стр. 2270-2277. IEEE, (2019)