Author of the publication

Exploiting extreme heterogeneity in a flood warning scenario using the Gridkit middleware.

, , , , , and . Middleware (Companion), page 54-57. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT., , , and . SenSys, page 41:1-41:2. ACM, (2017)Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs., , , and . CAVS, page 1-5. IEEE, (2019)Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms., , , , and . First Monday, (2014)A Survey of Security and Privacy Issues in V2X Communication Systems., , , , , , and . ACM Comput. Surv., 55 (9): 185:1-185:36 (2023)Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection., , , and . IPSN, page 525-526. IEEE, (2022)Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure., , , and . NCA, page 209-216. IEEE Computer Society, (2017)Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1124-1138 (March 2023)SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (5): 885-901 (2019)Dynamic QoS support for IoT backhaul networks through SDN., , , , and . FMEC, page 187-192. IEEE, (2018)Keynote I.. EUSPN/ICTH, volume 141 of Procedia Computer Science, page 6. Elsevier, (2018)