Author of the publication

ADF-BDD.DEV: Insights to undecided Statements in Abstract Dialectical Frameworks.

, and . AI³@AI*IA, volume 3546 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time implementation of a GMM-based binaural localization algorithm on a VLIW-SIMD processor, , , , , , and . International Conference on Multimedia and Expo (ICME), IEEE, (2017)Efficient Emulation of Floating-Point Arithmetic on Fixed-Point SIMD Processors, , and . IEEE International Workshop on Signal Processing Systems (SiPS), Dallas, USA, (2016)FLINT+: A Runtime-Configurable Emulation-Based Stochastic Timing Analysis Framework, , , , , and . International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS), IEEE, (2017)KAVUAKA: A Low-Power Application-Specific Processor Architecture for Digital Hearing Aids.. University of Hanover, Hannover, Germany, (2021)DNN-based performance measures for predicting error rates in automatic speech recognition and optimizing hearing aid parameters., , , , , and . Speech Commun., (2019)Evolutionary Algorithms for Instruction Scheduling, Operation Merging, and Register Allocation in VLIW Compilers., , and . J. Signal Process. Syst., 92 (7): 655-678 (2020)Reviving Meltdown 3a., , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 80-99. Springer, (2023)General Acyclicity and Cyclicity Notions for the Disjunctive Skolem Chase (Extended Abstract)., and . Description Logics, volume 3515 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)A Survey on Application Specific Processor Architectures for Digital Hearing Aids, , and . Journal of Signal Processing Systems, 94 (11): 1293--1308 (Nov 1, 2022)Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels., , , , , , , and . USENIX Security Symposium, page 7285-7302. USENIX Association, (2023)