Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fighting COVID-19 in the Dark: Methodology for Improved Inference Using Homomorphically Encrypted DNN., , and . CoRR, (2021)A New Test-Generation Methodology for System-Level Verification of Production Processes., , , , and . Haifa Verification Conference, volume 7857 of Lecture Notes in Computer Science, page 178-192. Springer, (2012)Development and Verification of Complex Hybrid Systems Using Synthesizable Monitors., , , , and . Haifa Verification Conference, volume 8244 of Lecture Notes in Computer Science, page 182-198. Springer, (2013)Algorithms for Finding Maximum Diversity of Design Variables in Multi-Objective Optimization., , , , and . CSER, volume 8 of Procedia Computer Science, page 171-176. Elsevier, (2012)A Cloud-Based Anomaly Detection for IoT Big Data., , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 87-104. Springer, (2020)Determinate composition of FMUs for co-simulation., , , , , , and . EMSOFT, page 2:1-2:12. IEEE, (2013)Pluggable Analysis Viewpoints for Design Space Exploration., , , , , , and . CSER, volume 16 of Procedia Computer Science, page 226-235. Elsevier, (2013)Using a High-Level Test Generation Expert System for Testing In-Car Networks., , , and . DAC, page 134:1-134:6. ACM, (2014)Tile Tensors: A versatile data structure with descriptive shapes for homomorphic encryption., , , , , , , , and . CoRR, (2020)Big data analysis of cloud storage logs using spark., , , , and . SYSTOR, page 30:1. ACM, (2017)