Get my own profile
Public access
View all11 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Hermann HärtigProfessor Computer Science, Technische Universität DresdenVerified email at tu-dresden.de
- Marcus VölpCritiX Lab, Interdisciplinary Centre for Security, Reliability and Trust, University of LuxembourgVerified email at uni.lu
- Bjoern DoebelAmazon Web ServicesVerified email at os.inf.tu-dresden.de
- Till SmejkalTU DresdenVerified email at tu-dresden.de
- Adam LackorzynskiProfessur Betriebssysteme, TU DresdenVerified email at os.inf.tu-dresden.de
- Thomas IlscheZIH, TU DresdenVerified email at tu-dresden.de
- Jeronimo CastrillonProfessor, TU DresdenVerified email at tu-dresden.de
- Robert KhasanovTU DresdenVerified email at tu-dresden.de
- Andrés GoensUniversity of AmsterdamVerified email at uva.nl
- Anni-Yasmin TurhanPaderborn UniversityVerified email at uni-paderborn.de
- Robert SchöneFaculty Computer Science / ZIH, TU DresdenVerified email at tu-dresden.de
- Daniel HackenbergCenter for Information Services and High Performance Computing (ZIH), TU DresdenVerified email at tu-dresden.de
- Mario BielertZIH, TU DresdenVerified email at tu-dresden.de
- Julian Alfredo MendezUmeå UniversityVerified email at umu.se
- Veronika ThostMIT-IBM Watson AI Lab, IBM ResearchVerified email at ibm.com
- Michael RoitzschBarkhausen InstitutVerified email at barkhauseninstitut.org
- Wolfgang LehnerTechnische Universität DresdenVerified email at tu-dresden.de
- Dirk HabichTechnische Universität DresdenVerified email at tu-dresden.de
- Kai LampkaNxp Semiconductors, Docent @ TU Kaiserslautern (part-time)Verified email at nxp.com