Author of the publication

Variation-tolerant Computing with Memristive Reservoirs.

, and . NANOARCH, page 1-6. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge., , , , and . Software Engineering & Management, volume P-239 of LNI, page 83-84. GI, (2015)Memristor panic - A survey of different device models in crossbar architectures., , , , and . NANOARCH, page 106-111. IEEE Computer Society, (2015)Volatile memristive devices as short-term memory in a neuromorphic learning architecture., and . NANOARCH, page 104-109. IEEE Computer Society/ACM, (2014)A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , and . Journal of Systems and Software, (2018)Computational Capacity and Energy Consumption of Complex Resistive Switch Networks., , , and . CoRR, (2015)Ontology-driven evolution of software security., , , and . Data Knowl. Eng., (2021)A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary)., , , , , and . SE/SWM, volume P-292 of LNI, page 179-180. GI, (2019)UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering., , and . IEEE Trans. Software Eng., 50 (1): 16-47 (January 2024)Maintaining Security in Software Evolution., , , , , , , , , and 4 other author(s). Managed Software Evolution, Springer, (2019)Ontology Evolution in the Context of Model-Based Secure Software Engineering., , and . RCIS, volume 385 of Lecture Notes in Business Information Processing, page 437-454. Springer, (2020)