Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Translation-Based Steganography., , , , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 219-233. Springer, (2005)Walkabout Revisited: The Runabout.. ECOOP, volume 2743 of Lecture Notes in Computer Science, page 103-125. Springer, (2003)How to Issue a Central Bank Digital Currency., , and . CoRR, (2021)Engineering a customizable intermediate representation., , , , , and . IVME, page 67-76. ACM, (2003)Byzantine Set-Union Consensus Using Efficient Set Reconciliation., and . ARES, page 29-38. IEEE Computer Society, (2016)CADET: Confidential ad-hoc decentralized end-to-end transport., and . Med-Hoc-Net, page 71-78. IEEE, (2014)Cryogenic: Enabling Power-Aware Applications on Linux., , , and . ICT4S, Atlantis Press, (2014)Encapsulating objects with confined types., , and . ACM Trans. Program. Lang. Syst., 29 (6): 32 (2007)Optimal Bitwise Register Allocation Using Integer Linear Programming., , , , and . LCPC, volume 4382 of Lecture Notes in Computer Science, page 267-282. Springer, (2006)R5N: Randomized recursive routing for restricted-route networks., and . NSS, page 316-321. IEEE, (2011)