Get my own profile
Public access
View all20 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Christel BaierTU DresdenVerified email at tu-dresden.de
Sascha KlüppelholzWissenschaftlicher Mitarbeiter (PostDoc) Technische Universität DresdenVerified email at tcs.inf.tu-dresden.de
Clemens DubslaffEindhoven University of Technology | CeTI (TU Dresden)Verified email at tue.nl
Steffen MärckerFaculty of Computer Science, TU DresdenVerified email at tu-dresden.de
David ParkerProfessor of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Sascha WunderlichTU DresdenVerified email at tu-dresden.de
Jan KřetínskýTechnical University of MunichVerified email at fi.muni.cz
Wolfgang LeisterActing Research Director, Norsk RegnesentralVerified email at nr.no
Jan StrejčekMasaryk UniversityVerified email at fi.muni.cz
Alexandre Duret-LutzLRDE / EPITAVerified email at lrde.epita.fr
František BlahoudekPure StorageVerified email at fi.muni.cz
Tim QuatmannPhD Student at RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Michaela KlauckSaarland University, Saarland Informatics Campus, Bosch ResearchVerified email at de.bosch.com
Marcus VölpCritiX Lab, Interdisciplinary Centre for Security, Reliability and Trust, University of LuxembourgVerified email at uni.lu
Hermann HärtigProfessor Computer Science, Technische Universität DresdenVerified email at tu-dresden.de
Arnd HartmannsUniversity of TwenteVerified email at utwente.nl
Ernst Moritz HahnUniversity of TwenteVerified email at utwente.nl
James WorrellProfessor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Stefan KieferAssociate Professor, University of OxfordVerified email at cs.ox.ac.uk
Sebastian JungesAssistant Professor, Radboud University, NijmegenVerified email at ru.nl