Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boolean Formulas for the Static Identification of Injection Attacks in Java., , , , and . LPAR, volume 9450 of Lecture Notes in Computer Science, page 130-145. Springer, (2015)Security layers and related services within the Horizon Europe NEUROPULS project., , , , , , , , , and 10 other author(s). CoRR, (2023)A Thread-Safe Library for Binary Decision Diagrams., , and . SEFM, volume 8702 of Lecture Notes in Computer Science, page 35-49. Springer, (2014)Locking discipline inference and checking., , , , and . ICSE, page 1133-1144. ACM, (2016)Real time Vehicle Color Recognition on a budget: an investigation on the usage of CNN architectures., , , , and . AVSS, page 1-8. IEEE, (2022)Point Selection: A New Comparison Scheme for Size Functions (With an Application to Monogram Recognition)., , , and . ACCV (1), volume 1351 of Lecture Notes in Computer Science, page 329-337. Springer, (1998)Static Identification of Injection Attacks in Java., , , , , , and . ACM Trans. Program. Lang. Syst., 41 (3): 18:1-18:58 (2019)Image Retrieval through Abstract Shape Indication., , , , , , , , and . MVA, page 367-370. (2000)Size Functions for Image Retrieval: A Demonstrator on Randomly Generated Curves., , , , and . CIVR, volume 2383 of Lecture Notes in Computer Science, page 235-244. Springer, (2002)Combined Motion and Appearance Models for Robust Object Tracking in Real-Time., , , and . AVSS, page 412-417. IEEE Computer Society, (2009)