Author of the publication

07041 Abstracts Collection - Power-aware Computing Systems.

, , , and . Power-aware Computing Systems, volume 07041 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security audits of multi-tier virtual infrastructures in public infrastructure clouds., , , , and . CCSW, page 93-102. ACM, (2010)Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction., , and . STAIRS, volume 222 of Frontiers in Artificial Intelligence and Applications, page 251-263. IOS Press, (2010)Attack Tree Analysis for Insider Threats on the IoT Using Isabelle., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 234-246. Springer, (2016)Modular Control Flow Analysis for Libraries.. SAS, volume 2477 of Lecture Notes in Computer Science, page 165-179. Springer, (2002)Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores., , , , , , , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 103-119. Springer, (2022)08302 Summary - Countering Insider Threats., , , and . Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)05141 Summary - Power-aware Computing Systems., , , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Fluid information systems., and . NSPW, page 125-132. ACM, (2009)Modeling and Verification of Insider Threats Using Logical Analysis., and . IEEE Syst. J., 11 (2): 534-545 (2017)Protocol Implementation Generator., and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 256-268. Springer, (2010)