Johannes Loinig

According to our database1, Johannes Loinig authored at least 22 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Impact of Image Sensor Output Data on Power Consumption of the Image Processing System.
Proceedings of the Intelligent Systems and Applications, 2022

2015
Where does all this waste come from?
J. Softw. Evol. Process., 2015

Hardware/software co-design for a high-performance Java Card interpreter in low-end embedded systems.
Microprocess. Microsystems, 2015

Balancing Product and Process Assurance for Evolving Security Systems.
Int. J. Secur. Softw. Eng., 2015

An Application Specific Processor for Enhancing Dictionary Compression in Java Card Environment.
Proceedings of the PECCS 2015, 2015

Test-Driven Migration Towards a Hardware-Abstracted Platform.
Proceedings of the PECCS 2015, 2015

2014
A light-weight compression method for Java card technology.
SIGBED Rev., 2014

Supporting evolving security models for an agile security evaluation.
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014

Patterns of Software Modeling.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

Embedding research in the industrial field: a case of a transition to a software product line.
Proceedings of the WISE'14, 2014

Memory-efficient on-card byte code verification for Java cards.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

Patterns for hardware-independent development for embedded systems.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

A High Performance Java Card Virtual Machine Interpreter Based on an Application Specific Instruction-Set Processor.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

Instruction Folding Compression for Java Card Runtime Environment.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

Heap ... Hop! Heap Is Also Vulnerable.
Proceedings of the Smart Card Research and Advanced Applications, 2014

2013
On the dictionary compression for Java card environment.
Proceedings of the International Workshop on Software and Compilers for Embedded Systems, 2013

2012
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Idea: Simulation Based Security Requirement Verification for Transaction Level Models.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Towards formal system-level verification of security requirements during hardware/software codesign.
Proceedings of the Annual IEEE International SoC Conference, SoCC 2010, 2010

Fast simulation based testing of anti-tearing mechanisms for small embedded systems.
Proceedings of the 15th European Test Symposium, 2010

2009
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009


  Loading...