Author of the publication

A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems.

, , , , and . FORMATS, volume 9268 of Lecture Notes in Computer Science, page 305-320. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Adversarial Phishing Detection., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)Designing Through The Stack: The Case for a Participatory Digital Security By Design., , , and . NSPW, page 45-59. ACM, (2022)Walking the Line: The Everyday Security Ties that Bind., and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 464-480. Springer, (2017)CTL as an Intermediate Language., and . VMCAI, volume 4905 of Lecture Notes in Computer Science, page 4. Springer, (2008)Worst-case memory consumption analysis for SCJ., , , and . JTRES, page 2-10. ACM, (2013)Semantic patches for documenting and automating collateral evolutions in Linux device drivers., , , and . PLOS, page 10. ACM, (2006)A Multi-Threaded Approach to Encoding with Random Linear Network Coding., , and . EW, page 1-7. VDE / IEEE, (2019)THAPS: Automated Vulnerability Scanning of PHP Applications., , , and . NordSec, volume 7617 of Lecture Notes in Computer Science, page 31-46. Springer, (2012)Towards Verification of Well-Formed Transactions in Java Card Bytecode., and . Bytecode@ETAPS, volume 141 of Electronic Notes in Theoretical Computer Science, page 145-162. Elsevier, (2005)Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code., , , , , , , , , and 2 other author(s). NordSec, volume 13115 of Lecture Notes in Computer Science, page 192-211. Springer, (2021)