The SCEAS System
Navigation Menu

Search the dblp DataBase


Matthias Jacob: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthias Jacob, Dan Boneh, Edward W. Felten
    Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:16-31 [Conf]
  2. Paul M. Murray, Todd Smith, Suresh Srinivas, Matthias Jacob
    Performance Issues for Multi-language Java Applications. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:544-551 [Conf]
  3. Michael Philippsen, Matthias Zenger, Matthias Jacob
    JavaParty - portables paralleles und verteiltes Programmieren in Java. [Citation Graph (0, 0)][DBLP]
    Java-Informations-Tage, 1998, pp:22-38 [Conf]
  4. David Detlefs, Ross Knippel, William D. Clinger, Matthias Jacob
    Concurrent Remembered Set Refinement in Generational Garbage Collection. [Citation Graph (0, 0)][DBLP]
    Java™ Virtual Machine Research and Technology Symposium, 2002, pp:13-26 [Conf]
  5. Matthias Jacob, Keith H. Randall
    Cross-Architectural Performance Portability of a Java Virtual Machine Implementation. [Citation Graph (0, 0)][DBLP]
    Java™ Virtual Machine Research and Technology Symposium, 2002, pp:79-89 [Conf]
  6. Matthias Jacob, Michael Philippsen, Martin Karrenbach
    Large-scale parallel geophysical algorithms in Java: a feasibility study. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 1998, v:10, n:11-13, pp:1143-1153 [Journal]
  7. Michael Philippsen, Matthias Jacob, Martin Karrenbach
    Fallstudie: Parallele Realisierung geophysikalischer Basisalgorithmen in Java. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1998, v:13, n:2, pp:72-78 [Journal]
  8. Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
    Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds (Awarded Best Student Paper). [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]
  9. Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
    Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:129-140 [Conf]

  10. Live-Manuskript - Ein Werkzeug zur kollaborativen Erstellung von Notizen und Mitschriften. [Citation Graph (, )][DBLP]

  11. The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP]

  12. The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP]

  13. Designing a vision-based mobile interface for in-store shopping. [Citation Graph (, )][DBLP]

  14. Automated Data Augmentation Services Using Text Mining, Data Cleansing and Web Crawling Techniques. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002