Publications
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2023
146.
Schilling A,
Aehle M,
Alme J,
Barnaföldi GG,
Bodova T,
Borshchov V,
Brink A,
Eikeland VN,
Feofilov G,
Garth C,
Gauger NR,
Grøttvik OS,
Helstrup H,
Igolkin S,
Keidel R,
Kobdaj C,
Kortus T,
Leonhardt V,
Mehendale S,
Mulawade RN,
Odland OH,
O'Neill G,
Papp G,
Peitzmann T,
Pettersen HES,
Piersimoni P,
Protsenko M,
Rauch M,
Rehman AU,
Richter M,
Roehrich D,
Santana J,
Seco J,
Songmoolnak A,
Sudár Á,
Tambave G,
Tymchuk I,
Ullaland K,
Varga-Kőfaragó M,
Volz L,
Wagner B,
Wendzel S,
Wiebel A,
Xiao R,
Yang S,
Zillien S.
Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter.
Physics in Medicine and Biology.
2023;
68194001.
[DOI]
[File]
145.
Domaschka J,
Volpert S,
Maier K,
Eisenhart G,
Seybold D.
Using eBPF for Database Workload Tracing: An Explorative Study. In:
Companion of the 2023 ACM/SPEC International Conference on Performance Engineering.
2023.
p. 311—317.
2022
139.
Volpert S,
Eisenhart G,
Domaschka J.
Are Kubernetes CNI solutions ready for> 10 Gbit/s?.
2022;
132.
Wendzel S,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022).
ACM;
2022.
131.
Eisenhart G,
Volpert S,
Braitinger J,
Domaschka J.
Recognition of Similar NetFlow Data in Decentralised Monitoring Environments.
2022;
2021
126.
Wendzel S,
Caviglione L,
Mazurczyk W,
Mileva A,
Dittmann J,
Krätzer C,
Lamshöft K,
Vielhauer C,
Hartmann L,
Keller J,
Neubert T.
A Revised Taxonomy of Steganography Embedding Patterns. In:
Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021).
ACM;
2021.
[DOI]
[File]