default search action
Markus Schumacher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Dirk Sammel, Michael Boehler, Anton J. Gamel, Markus Schumacher:
Lightweight Integration of a Data Cache for Opportunistic Usage of HPC Resources in HEP Workflows. Comput. Softw. Big Sci. 7(1): 7 (2023)
2010 – 2019
- 2019
- [j6]Felix Bührer, Frank Fischer, Georg Fleig, Anton J. Gamel, Manuel Giffels, Thomas Hauth, Michael Janczyk, Konrad Meier, Günter Quast, Benoît Roland, Ulrike Schnoor, Markus Schumacher, Dirk von Suchodoletz, Bernd Wiebelt:
Dynamic Virtualized Deployment of Particle Physics Environments on a High Performance Computing Cluster. Comput. Softw. Big Sci. 3(1) (2019) - [c12]Carlo Guarnieri Calo Carducci, Antonello Monti, Markus Hans Schraven, Markus Schumacher, Dirk Müller:
Enabling ESP32-based IoT Applications in Building Automation Systems. MetroInd4.0&IoT 2019: 306-311 - 2015
- [c11]Lukasz Wisniewski, Markus Schumacher, Jürgen Jasperneite, Christian Diedrich:
Increasing flexibility of Time Triggered Ethernet based systems by optimal greedy scheduling approach. ETFA 2015: 1-6 - 2014
- [c10]Lukasz Wisniewski, Markus Schumacher, Jürgen Jasperneite, Christian Diedrich:
Linear time, possibly disjoint path search approach for ethernet based industrial automation networks. ETFA 2014: 1-9 - 2012
- [c9]Lukasz Wisniewski, Markus Schumacher, Jürgen Jasperneite, Sebastian Schriegel:
Fast and simple scheduling algorithm for PROFINET IRT networks. WFCS 2012: 141-144
2000 – 2009
- 2009
- [j5]Jürgen Jasperneite, Jahanzaib Imtiaz, Markus Schumacher, Karl Weber:
A Proposal for a Generic Real-Time Ethernet System. IEEE Trans. Ind. Informatics 5(2): 75-85 (2009) - 2007
- [j4]Markus Schumacher, Dominik Witte:
Secure Enterprise SOA - Known and new security challenges. Datenschutz und Datensicherheit 31(9): 652-655 (2007) - [c8]Jürgen Jasperneite, Markus Schumacher, Karl Weber:
Limits of increasing the performance of Industrial Ethernet protocols. ETFA 2007: 17-24 - 2006
- [j3]Markus Schumacher, Andreas Wiegenstein:
Sichere Web-Anwendungen - Vor-und Nachteile beim Einsatz von Sicherheitstestwerkzeugen. Datenschutz und Datensicherheit 30(10): 611-615 (2006) - 2005
- [b3]Markus Schumacher, Eduardo B. Fernández-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad:
Security Patterns - Integrating Security and Systems Engineering. Wiley 2005, ISBN 978-0-470-85884-4, pp. I-XXXIII, 1-565 - 2003
- [b2]Markus Schumacher:
Security Engineering with Patterns - Origins, Theoretical Models, and New Applications. Lecture Notes in Computer Science 2754, Springer 2003, ISBN 3-540-40731-6 - [b1]Markus Schumacher, Utz Rödig, Marie-Luise Moschgath:
Hacker Contest - Sicherheitsprobleme, Lösungen, Beispiele. Xpert.press, Springer 2003, ISBN 978-3-642-62506-0, pp. I-XI, 1-301 - [c7]Haralambos Mouratidis, Paolo Giorgini, Markus Schumacher:
A Set of Patterns for Secure Agent Systems. EuroPLoP 2003: 399-416 - [c6]Markus Schumacher:
Firewall Patterns. EuroPLoP 2003: 417-430 - 2002
- [j2]Markus Schumacher:
aktuelles schlagwort: Security Patterns. Inform. Spektrum 25(3): 220-223 (2002) - [c5]Markus Schumacher:
Security Patterns and Security Standards. EuroPLoP 2002: 289-300 - [c4]Jan Steffan, Markus Schumacher:
Collaborative attack modeling. SAC 2002: 253-259 - 2001
- [c3]Ralf Ackermann, Markus Schumacher, Utz Roedig, Ralf Steinmetz:
Vulnerabilities and Security Limitations of current IP Telephony Systems. Communications and Multimedia Security 2001 - 2000
- [j1]Markus Schumacher, Marie-Luise Moschgath, Utz Roedig:
Angewandte Informationssicherheit Ein Hacker-Praktikum an Universitäten. Inform. Spektrum 23(3): 202-211 (2000) - [c2]Peer Hasselmeyer, Markus Schumacher, Marco Voß:
Pay As You Go-Associating Costs with Jini Leases. EDOC 2000: 48-57 - [c1]Markus Schumacher, Ralf Steinmetz:
Sicherheit in Mediendaten. GI Jahrestagung 2000: 463-464
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint