Search the dblp DataBase
Matthias Jacob :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Matthias Jacob , Dan Boneh , Edward W. Felten Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2002, pp:16-31 [Conf ] Paul M. Murray , Todd Smith , Suresh Srinivas , Matthias Jacob Performance Issues for Multi-language Java Applications. [Citation Graph (0, 0)][DBLP ] IPDPS Workshops, 2000, pp:544-551 [Conf ] Michael Philippsen , Matthias Zenger , Matthias Jacob JavaParty - portables paralleles und verteiltes Programmieren in Java. [Citation Graph (0, 0)][DBLP ] Java-Informations-Tage, 1998, pp:22-38 [Conf ] David Detlefs , Ross Knippel , William D. Clinger , Matthias Jacob Concurrent Remembered Set Refinement in Generational Garbage Collection. [Citation Graph (0, 0)][DBLP ] Java Virtual Machine Research and Technology Symposium, 2002, pp:13-26 [Conf ] Matthias Jacob , Keith H. Randall Cross-Architectural Performance Portability of a Java Virtual Machine Implementation. [Citation Graph (0, 0)][DBLP ] Java Virtual Machine Research and Technology Symposium, 2002, pp:79-89 [Conf ] Matthias Jacob , Michael Philippsen , Martin Karrenbach Large-scale parallel geophysical algorithms in Java: a feasibility study. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 1998, v:10, n:11-13, pp:1143-1153 [Journal ] Michael Philippsen , Matthias Jacob , Martin Karrenbach Fallstudie: Parallele Realisierung geophysikalischer Basisalgorithmen in Java. [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 1998, v:13, n:2, pp:72-78 [Journal ] Srikanth Kandula , Dina Katabi , Matthias Jacob , Arthur Berger Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds (Awarded Best Student Paper). [Citation Graph (0, 0)][DBLP ] NSDI, 2005, pp:- [Conf ] Matthias Jacob , Mariusz H. Jakubowski , Ramarathnam Venkatesan Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:129-140 [Conf ] Live-Manuskript - Ein Werkzeug zur kollaborativen Erstellung von Notizen und Mitschriften. [Citation Graph (, )][DBLP ] The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP ] The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP ] Designing a vision-based mobile interface for in-store shopping. [Citation Graph (, )][DBLP ] Automated Data Augmentation Services Using Text Mining, Data Cleansing and Web Crawling Techniques. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs