Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Benjamin ErbResearch Fellow, Ulm UniversityVerified email at uni-ulm.de
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Stefan PfattheicherDepartment of Psychology and Behavioural Sciences, Aarhus UniversityVerified email at psy.au.dk
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Matthias MatousekPhD Student of Computer Science, University of Ulm, GermanyVerified email at uni-ulm.de
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Felix EngelmannOhio State UniversityVerified email at osu.edu
David MödingerPhD, Previously Ulm UniversityVerified email at ketzu.net
Franz J. HauckProfessor of Distributed Systems, Ulm University, GermanyVerified email at uni-ulm.de
Jonathan PetitQualcommVerified email at qti.qualcomm.com
Michael P. HeinlMunich University of Applied Sciences, Technical University of MunichVerified email at hm.edu
Rens W. van der HeijdenUlm University [2012-2019]Verified email at uni-ulm.de
Laurens Sionimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Kim WuytsDistriNet, KU LeuvenVerified email at cs.kuleuven.be
Hoon Wei LimSingtelVerified email at singtel.com
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Bram Leendersstudent Distributed Systems and Services, KTH Royal Institute of TechnologyVerified email at kth.se