Author of the publication

05141 Abstracts Collection - Power-aware Computing Systems.

, , , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A move in the security measurement stalemate: elo-style ratings to quantify vulnerability., , and . NSPW, page 1-14. ACM, (2012)Protocol Implementation Generator., and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 256-268. Springer, (2010)Modeling and Verification of Insider Threats Using Logical Analysis., and . IEEE Syst. J., 11 (2): 534-545 (2017)A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing., , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)05141 Abstracts Collection - Power-aware Computing Systems., , , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Guaranteeing Privacy-Observing Data Exchange.. ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 958-969. (2016)Modelling Configuration Knowledge in Heterogeneous Product Families., , , and . Configuration Workshop, volume 755 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis., and . IEEE Symposium on Security and Privacy Workshops, page 229-235. IEEE Computer Society, (2014)Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction., , and . STAIRS, volume 222 of Frontiers in Artificial Intelligence and Applications, page 251-263. IOS Press, (2010)Modular Control Flow Analysis for Libraries.. SAS, volume 2477 of Lecture Notes in Computer Science, page 165-179. Springer, (2002)