default search action
Johannes Loinig
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c19]Gernot Fiala, Johannes Loinig, Christian Steger:
Impact of Image Sensor Output Data on Power Consumption of the Image Processing System. IntelliSys (1) 2022: 618-636
2010 – 2019
- 2015
- [j4]Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner:
Balancing Product and Process Assurance for Evolving Security Systems. Int. J. Secur. Softw. Eng. 6(1): 47-75 (2015) - [j3]Massimiliano Zilli, Wolfgang Raschke, Reinhold Weiss, Johannes Loinig, Christian Steger:
Hardware/software co-design for a high-performance Java Card interpreter in low-end embedded systems. Microprocess. Microsystems 39(8): 1076-1086 (2015) - [j2]Wolfgang Raschke, Massimiliano Zilli, Johannes Loinig, Reinhold Weiss, Christian Steger, Christian Kreiner:
Where does all this waste come from? J. Softw. Evol. Process. 27(8): 584-590 (2015) - [c18]Wolfgang Raschke, Massimiliano Zilli, Johannes Loinig, Reinhold Weiss, Christian Steger, Christian Kreiner:
Test-Driven Migration Towards a Hardware-Abstracted Platform. PECCS 2015: 261-267 - [c17]Massimiliano Zilli, Wolfgang Raschke, Johannes Loinig, Reinhold Weiss, Christian Steger:
An Application Specific Processor for Enhancing Dictionary Compression in Java Card Environment. PECCS 2015: 305-311 - 2014
- [j1]Massimiliano Zilli, Wolfgang Raschke, Reinhold Weiss, Christian Steger, Johannes Loinig:
A light-weight compression method for Java card technology. SIGBED Rev. 11(4): 13-18 (2014) - [c16]Guillaume Bouffard, Michael Lackner, Jean-Louis Lanet, Johannes Loinig:
Heap ... Hop! Heap Is Also Vulnerable. CARDIS 2014: 18-31 - [c15]Massimiliano Zilli, Wolfgang Raschke, Reinhold Weiss, Johannes Loinig, Christian Steger:
Instruction Folding Compression for Java Card Runtime Environment. DSD 2014: 228-235 - [c14]Massimiliano Zilli, Wolfgang Raschke, Reinhold Weiss, Johannes Loinig, Christian Steger:
A High Performance Java Card Virtual Machine Interpreter Based on an Application Specific Instruction-Set Processor. DSD 2014: 270-278 - [c13]Wolfgang Raschke, Massimiliano Zilli, Stefan Orehovec, Erik Gera-Fornwald, Johannes Loinig, Christian Steger, Christian Kreiner:
Patterns for hardware-independent development for embedded systems. EuroPLoP 2014: 11:1-11:14 - [c12]Massimiliano Zilli, Wolfgang Raschke, Reinhold Weiss, Johannes Loinig, Christian Steger:
A Light-weight Compression Method for Java Card Technology. EWiLi 2014 - [c11]Reinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner:
Memory-efficient on-card byte code verification for Java cards. CS2@HiPEAC 2014: 37-40 - [c10]Wolfgang Raschke, Massimiliano Zilli, Johannes Loinig, Reinhold Weiss, Christian Steger, Christian Kreiner:
Embedding research in the industrial field: a case of a transition to a software product line. WISE@ASE 2014: 3-8 - [c9]Wolfgang Raschke, Massimiliano Zilli, Johannes Loinig, Reinhold Weiss, Christian Steger, Christian Kreiner:
Patterns of Software Modeling. OTM Workshops 2014: 428-437 - [c8]Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner:
Supporting evolving security models for an agile security evaluation. ESPRE 2014: 31-36 - 2013
- [c7]Massimiliano Zilli, Wolfgang Raschke, Johannes Loinig, Reinhold Weiss, Christian Steger:
On the dictionary compression for Java card environment. M-SCOPES 2013: 68-76 - 2012
- [c6]Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger:
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection. CARDIS 2012: 1-15 - 2011
- [c5]Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Idea: Simulation Based Security Requirement Verification for Transaction Level Models. ESSoS 2011: 264-271 - 2010
- [c4]Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Fast simulation based testing of anti-tearing mechanisms for small embedded systems. ETS 2010: 242 - [c3]Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Towards formal system-level verification of security requirements during hardware/software codesign. SoCC 2010: 388-391 - [c2]Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. WISTP 2010: 316-323
2000 – 2009
- 2009
- [c1]Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality. SSIRI 2009: 342-347
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint