Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications in category Presentations - back to overwiew...

Presentations

M. Kalany, J. Träff: Efficient, Optimal MPI Datatype Reconstruction for Vector and Index Types
22nd European MPI Users' Group Meeting, EuroMPI 2015, Bordeaux, France; in: Proceedings of the 22nd European MPI Users' Group Meeting, EuroMPI 2015, J. Dongarra, A. Denis, B. Goglin, E. Jeannot, G. Mercier (ed.); ACM, 2015, ISBN: 978-1-4503-3795-3; 10 pages
bib details doi

S. Hunold (invited): Accurately Measuring MPI Collectives with Synchronized Clocks
Dagstuhl Seminar 15281: Algorithms and Scheduling Techniques to Manage Resilience and Power Consumption in Distributed Systems, Schloss Dagstuhl, Wadern, Germany
bib details

J. Träff (invited): The Power of Structured Data in MPI
The University of Texas at Austin, Prof. Robert A. van de Geijn, Austin, Texas
bib details

I. Haghighi, A. Jones, J. Kong, E. Bartocci, R. Grosu, C. Belta: SpaTeL: A Novel Spatial-Temporal Logic and Its Applications to Networked Systems
18th International Conference on Hybrid Systems: Computation and Control (HSCC), Seattle, USA; in: Proc. of HSCC 2015: the 18th International Conference on Hybrid Systems: Computation and Control, ACM, 2015, ISBN: 978-1-4503-3433-4, p. 189 - 198
bib details doi

M. Bader, A. Richtsfeld, M. Suchi, G. Todoran, W. Kastner, M. Vincze: Coordination of an Autonomous Fleet
Austrian Robotics Workshop (ARW), Klagenfurt; in: Proceedings of the Austrian Robotics Workshop 2015, 2015; 2 pages
bib details

J. Träff (invited): The Relative Power of Synchronization Primitives
Computational Mathematics in Engineering Group - Prof. Dr. Joachim Schöberl, Institute for Analysis and Scientific Computing, TU Wien, Vienna, Austria
bib details

S. Hunold (invited): One Step towards Bridging the Gap between Theory and Practice in Moldable Task Scheduling with Precedence Constraints
Wirtschaftswissenschaftliche Fakultät, Universität Augsburg, Augsburg, Deutschland
bib details

S. Kandl (invited): How Mutations Can Help to Prove That Your System Does Not Contain (Unwanted) Mutations
Design, Automation and Test in Europe Conference (DATE), Grenoble, France; in: DATE 2015 - M04 Embedded Systems: Functional Qualification: Applications in the C/C++ Domain, 2015
bib details

M. Wimmer, J. Gruber, J. Träff, P. Tsigas: The Lock-Free k-LSM Relaxed Priority Queue
20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP 2015, San Francisco, CA, USA; in: Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP 2015, A. Cohen, D. Grove (ed.); ACM, 2015, ISBN: 978-1-4503-3205-7, p. 277 - 278
bib details doi

S. Kandl et al.: Applicability of Formal Methods for Safety-Critical Systems in the Context of ISO 26262
Safety-critical Systems Symposium (SSS 2015), Bristol, UK; in: Engineering Systems for Safety: Proceedings of the Twenty-third Safety-critical Systems Symposium, M. Parson, T. Anderson (ed.); 2015, ISBN: 978-1505689082, p. 95 - 115
bib details

D. Prokesch: Single-Path Code Generation for the Patmos Processor
TACLe 5th Joint WG/MC Meeting, Amsterdam, Niederlande
bib details

M. Jung, J. Weidinger: IoTSyS - Control Logic Editor
IPSO Challenge 2014, Chicago, USA
bib details

F. Andren, T. Strasser, W. Kastner: Model-Driven Engineering applied to Smart Grid Automation using IEC 61850 and IEC 61499
Power Systems Computation Conference, Wroclaw, Poland; in: Proceedings 18th Power Systems Computation Conference, 2014, p. 1 - 7
bib details

A. Dabrowski, P. Fejes, J. Ullrich, K. Krombholz, H. Hobel, E. Weippl: Hardware Trojans - Detect and React?
Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA
bib details

A. Dabrowski, H. Hobel, J. Ullrich, K. Krombholz, E. Weippl: Towards a Hardware Trojan Detection Cycle
International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland; in: International Workshop on Emerging Cyberthreats and Countermeasures, 2014
bib details

A. Dabrowski, K. Krombholz, J. Ullrich, E. Weippl: QR - Inception: Barcode in Barcode Attacks
4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA; in: ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2014
bib details

A. Dabrowski, N. Pianta, T. Klepp, M. Mulazzani, E. Weippl: IMSI-Catch Me If You Can: IMSI-Catcher-Catchers
Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA; in: Annual Computer Security Applications Conference (ACSAC), 2014
bib details

A. Pavlogiannis, K. Chatterjee, U. Schmid, A. Kößler: A Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks
35th IEEE Real-Time Systems Symposium, Rome; in: Proccedings IEEE Real-Time Systems Symposium (RTSS'14), 2014, ISSN: 1052-8725, p. 118 - 127
bib details doi

P. Degasperi, S Hepp, W. Puffitsch, M. Schöberl: A Method Cache for Patmos
17th IEEE International Symposium on Object/Component-Oriented Real-Time Distributed Computing (ISORC), Reno, Nevada, USA; in: Proc. of the 17th IEEE International Symposium on Object/Component-Oriented Real-Time Distributed Computing, 2014, ISSN: 1555-0885, p. 100 - 108
bib details doi

M. Schwarz, K. Winkler, U. Schmid, M. Biely, P. Robinson: Brief Announcement: Gracefully Degrading Consensus and k-Set Agreement under Dynamic Link Failures
33th ACM SIGACTSIGOPS Symposium on Principles of Distributed Computing (PODC), Paris, France; in: Proceedings of the 33th ACM SIGACTSIGOPS Symposium on Principles of Distributed Computing, ACM, 2014, p. 341 - 343
bib details doi

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 >   >>