Felix Freiling


1 2 3


Prof. Dr.-Ing. Felix Freiling

Room 12.159
Martensstr. 3
91058 Erlangen

Tel. +49 9131 85 69901   |   Fax +49 9131 85 69919

felix.freiling ( at ) cs.fau.de



 

I am a professor of computer science at Friedrich-Alexander-Universität Erlangen-Nürnberg. Since I work in the area of applied computer security I am constantly trying to cover my traces: From 2002 to 2010 I worked at five different universities under two different names.

I don't have any account in social media, so any account with my name is probably somebody else's.

Announcements

My Sprechstunde during summer semester 2014 is Tuesdays between 16:00 and 17:00. Please indicate in advance to Christine Stief if you plan to come.

Felix Freiling's Email Policy

On December 18, 2008 the number of unanswered messages in my email inbox surpassed 1000. I surrender! On christmas day 2008 I decided to change my email handling policy: In the future, I will treat emails more like I treat telephone calls. I will fix a time interval d and after d time I will completely remove all unanswered email from my inbox that is older than d. This means I will most probably not respond anymore to emails that have not been answered in d time. Currently d is one year, but it may be adjusted. I apologize for any inconvenience this may cause, but I am now convinced that I cannot continue to treat email the same as I treat postal mail. If you need a definitive response from me within a certain time, it is probably more reliable to send a letter by postal mail.

Update in April 2009: d is now 6 months.

Update in July 2009: d is now 2 months.

Update in December 2010: d is now 3 weeks.

Update in January 2012: d is now 1 week

Update in December 2013: d is now 4 days.

Update in December 2014: d is now 2 days.

Exams

Students planning an oral examination have the chance to visit such an exam as an observer (Hospitation) beforehand under the condition that they do not disturb the exam and the examined student agrees.

Internship and Employment Opportunities

My lab infrequently offers internships and short or long term employment to interested and well-qualified candidates. I however only reply to normal postal mail or (sometimes) to email which has been sent individually to me. In case you wish to communicate via email and are looking for an internship, please include the code word "ref: nightingale" in the subject of your mail to prove that you prepared an individual email.

Professional activities

Academic Administration/Politics/Honorary Positions

  • 2004-2008: Vorstandsmitglied im GI Beirat der Universitätsprofessoren (GIBU)
  • 2006: Member of the expert commission to evaluate the online voting system for the DFG
  • Sommersemester 2006: Direktor des Instituts für Informatik der Universität Mannheim
  • May 2007-September 2009: Direktor des Instituts für Informatik der Universität Mannheim
  • October 2007: Advisor of the German constitutional court (Bundesverfassungsgericht) in the public hearing on "Online Durchsuchungen"
  • Sommersemester 2008: Prodekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • Herbstsemester 2008-November 2010: Dekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • June 2009: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on "Vorratsdatenspeicherung"
  • since May 2011: Mitglied des Senats- und Bewilligungsausschusses für die Graduiertenkollegs der DFG
  • since July 2011: Mitglied der Masterzulassungskommission der Technischen Fakultät der FAU
  • since October 2011: Mitglied der Studienkommission des Department Informatik der FAU
  • since July 2012: Vertreter der FAU im Fakultätentag Informatik
  • since November 2012: Mitglied im wissenschaftlichen Beirat der Firma RedTeam Pentesting GmbH, Aachen
  • since May 2014: member of the Steering Committee of the International Conference on IT Security Incident Management & IT Forensics (IMF)
  • since September 2014: Mitglied im Aufsichtsrat der Cryptotec AG, Köln
  • since October 2014: Studiendekan 3 der Technischen Fakultät der FAU
  •  

Research Interests

Dependable distributed systems (theory and practice)

Reviewed PhD and Habilitation Theses

  • Matthias Meixner: HADES - Eine hochverfügbare Main-Memory Datenbank für eventbasierte Systeme. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Alejandro Buchmann). Defended December 17, 2004, TU Darmstadt.
  • Martin Hutle: Failure Detection in Sparse Networks. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Ulrich Schmid). Defended October 4, 2005, TU Wien.
  • Erik-Oliver Blaß: Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Dr. Martina Zitterbart). Defended April 20, 2007, University of Karlsruhe.
  • Dr. Guido Schryen: An analysis of anti-spam measures and the conceptual design of a technological and organizational infrastructure framework for tackling spam e-mails. Habilitation thesis, RWTH Aachen, 2007.
  • Lucia Draque Penso: Distributed Protocols Robust Against Malicious Attacks. (PhD defense committee member with Prof. Maurice Herlihy and Prof. Anna Lysyanskaya). Defended January 30, 2008. Brown University, Providence, RI, USA.
  • Mohammad Torabi Dashti: Keeping Fairness Alive. (PhD defense committee member, advisor was Prof. Wan Fokkink). Defended Februrary 27, 2008. Vrije Universiteit Amsterdam.
  • Wei Zhou: Access Control Model and Policies for Collaborative Environments. (PhD thesis, external reviewer, first reviewer: Prof. Christoph Meinel.) Defended April 27, 2009, Hasso Plattner Institute (HPI), Potsdam.
  • Ionannis Krontiris: Intrusion Prevention and Detection in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Tassos Dimitriou, AIT, Greece). Defended November 13, 2008. University of Mannheim.
  • Zinaida Benenson: Access Control in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Adrian Perrig, CMU). Defended Dec. 19, 2008. University of Mannheim.
  • Oliver Steffen Weiß: A model to quantitavely assess the security of organizations. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. K. Meyer-Wegener, Univ. Erlangen). Defended Feb 20, 2009. Univ. Erlangen.
  • Thorsten Holz: Tracking and Mitigation of Malicious Remote Control Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Kruegel, UCSB). Defended April 30, 2009. University of Mannheim.
  •  Frank Werner: Applied Formal Methods in Wireless Sensor Networks. (2nd reviewer, 1st reviewer Prof. Dr. P. H. Schmitt, Univ. of Karlsruhe). Defended July 22, 2009. Univ. of Karlsruhe.
  • Timo Warns: Structural Failure Models for Fault-Tolerant Distributed Computing. (PhD thesis, 3rd reviewer, 1st and 2nd reviewers Prof. Dr. Oliver Theel, University of Oldenburg, Prof. Dr. Willi Hasselbring, University of Kiel). Defended Sept, 28, 2009. University of Oldenburg.
  • Michael Becher: Security of Smartphones at the Dawn of Their Ubiquitousness. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Ulrike Meyer, RWTH Aachen). Defended October 9, 2009. University of Mannheim.
  • Martin Mink: Vergleich von Lehransätzen für die Ausbildung in IT-Sicherheit. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Simone Fischer-Hübner, Karlstad University, Sweden). Defended Dec 11, 2009. University of Mannheim.
  • Moritz Martens: Properties of Interaction Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. Mila Majster-Cederbaum, University of Mannheim). Defended Dec 18, 2009. University of Mannheim.
  • Roberto Cortinas: Failure Detectors and Communication Efficiency in the Crash and General Omission Failure Models. (Member of PhD defense committee, advisors: Prof. Alberto Laufente, Prof. Iratxe Soraluze, University of the Basque Country, San Sebastian, Spain) Defended April 4, 2011. University of the Basque Country, San Sebastian, Spain.
  • Jan Gerrit Göbel: Large-Scale Detection and Measurement of Malicious Content. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended April 27, 2011. University of Mannheim.
  • Michael Müter: Embedded Security Concepts for In-Verhicle Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Frank Kargl, University of Twente) Defended May 27, 2011. University of Mannheim.
  • Tobias Limmer: Efficient Network Monitoring for Attack Detection. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Falko Dressler, University of Innsbruck, Austria) Defended June 20, 2011. University of Erlangen.
  • Philipp Trinius: Musterbasiertes Filtern von Schadprogrammen und Spam. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended October 21, 2011. University of Mannheim.
  • Sebastian Schinzel: Unintentional and hidden information leaks in networked software applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jörg Schwenk, Ruhr-University Bochum) Defended April 23, 2012. University of Erlangen.
  • Amir Alsbih: Technische Sicherheitsaspekte bei Kabelnetzbetreibern. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Christian Schindelhauer, University of Freiburg) Defended May 8, 2012. University of Freiburg.
  • Juliane Blechinger: Ein Metadatenrepositorium zum Datenqualitätsmonitoring im Concurrent Engineering. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Richard Lenz, University of Erlangen) Defended July 6, 2012. University of Erlangen.
  • Zhang Fu: Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation. (PhD thesis, faculty opponent, advisors Marina Papatriantafilou and Philippas Tsigas, Chalmers University of Technology) Defended September 19, 2012. Chalmers University of Technology, Sweden.
  • Andreas Dewald: Formalisierung digitaler Spuren und ihre Einbettung in die forensische Informatik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended  November 12, 2012. University of Erlangen.
  • Michael Spreitzenbarth: Dissecting the Droid: Forensic Analysis of Android and its Malicious Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended March 11, 2013. University of Erlangen.
  • Christian Jörn Dietrich: Identification and Recognition of Remote-Controlled Malware. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended March 28, 2013. University of Mannheim.
  • Joshua Isaac James: Automated Human Inference in Digital Forensic Investigations Using Hypothesis Reduction. (PhD thesis, external examiner, advisor Dr. Pavel Gladyshev, University College Dublin) Defended April 26, 2013. University College Dublin, Ireland.
  • Ralf Hund: Analysis and Retrofitting of Security Properties for Proprietary Software Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universiy Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Carsten Willems: Instrumenting Existing System Componente for Dynamic Analysis of Malicious Software. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Christian Gorecki: Dilution - A novel Approach in Preserving Privacy. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Strufe, TU Darmstadt) Defended April 30, 2013. University of Mannheim.
  • Steffen Wendzel: Novel Approaches for Network Covert Storage Channels. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Keller, FernUniversität Hagen) Defended May 7, 2013. FernUniversität Hagen.
  • Johannes Barnickel: Authentication and Identity Privacy in the Wireless Domain. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen) Defended June 4, 2013. RWTH Aachen.
  • Tilo Müller: On the security of full disk encryption. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Wolfgang Schröder-Prekschat, FAU) Defended June 5, 2013. FAU
  • Marek Jawurek: Privacy in Smart Grids. (PhD thesis, 1st rewiewer, 2nd reviewer Prof. Günter Müller, University of Freiburg) Defended July 17, 2013. FAU
  • Markus Engelberth: Social Malcode - Benutzerabhängige Schadprogramme. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended September 11, 2013. University of Mannheim.
  • Raul Schmidlin Fajardo Silva: Contract Testing for Reliable Embedded Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Reinhard Männer, Universität Heidelberg) Defended November 18, 2013. University of Heidelberg.
  • Stefan Vömel: Forensic Acquisition and Analysis of Volatile Data in Memory. (PhD thesis, 1st reviewer, 2nd reviewer Dr. Pavel Gladyshev, University College Dublin) Defended December 18, 2013. FAU.
  • Christopher Meyer: 20 Years of SSL/TLS Research - An Analysis of the Internet's Security Foundation. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended February 7, 2014, Ruhr-Universität Bochum.
  • Tobias Distler: Resource-efficient Fault and Intrusion Tolerance. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Wolfgang Schröder-Preikschat, 2nd reviewer: Prof. Rüdiger Kapitza, TU Braunschweig) Defended June 24, 2014. FAU.
  • Frank Breitinger: On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Stefan Katzenbeisser, TU Darmstadt, 2nd reviewer: Prof. Harald Baier, Hochschule Darmstadt) Defended June 30, 2014. TU Darmstadt.
  • Johannes Hoffmann: From Mobile to Security - Towards Secure Smartphones. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended August 28, 2014. Ruhr-Universität Bochum.

List of Student Placements

This list will probably move to a different location soon. It should give an insight into the type of employment which our students typically do. It is meant as a feedback for prospective diploma (and other) students and as a form of controlling for us.

  • Marc Albertz (Diploma RWTH Aachen, 2006), hired by Accenture
  • Matthias Majuntke (Diploma RWTH Aachen, 2006), started PhD at TU Darmstadt
  • Thorsten Holz (Diploma RWTH Aachen, 2006), started PhD at University of Mannheim
  • Hans-Georg Eßer (Diploma RWTH Aachen, 2005), continues to work as editor for EasyLinux and Linux Magazin
  • Tobias Hülsdau (Diploma RWTH Aachen, 2006), hired by Leano Media
  • Andreas Sensen (Diploma RWTH Aachen, 2006), hired by T-Com
  • Michael Becher (Diploma RWTH Aachen, 2006), started PhD at University of Mannheim
  • Andreas Tielmann (Diploma RWTH Aachen, 2006), started PhD at University of Paris 7
  • Bastian Schwittay (Diploma RWTH Aachen, 2006) hired by Symantec
  • Sven Henkel (Diploma RWTH Aachen, 2006), hired by SAP
  • Samad Nasserian (Diploma RWTH Aachen, 2006), hired by SAP
  • Peter Cholewinski (Diploma RWTH Aachen, 2005), hired by SAP
  • Nils Gedicke (Diploma RWTH Aachen, 2005), hired by Siemens
  • Robert Heracles (Diploma RWTH Aachen, 2006), hired by ESE GmbH Braunschweig
  • Joachim Wieland (Diploma RWTH Aachen, 2006), hired by SAP
  • Boris Leidner (Diploma RWTH Aachen, 2007)
  • Jens Liebchen (Diploma RWTH Aachen, 2007) runs RedTeam Pentesting
  • Michael Schüler (Diploma RWTH Aachen, 2007), hired by Cisco Systems
  • Christian Hönig (Diploma RWTH Aachen, 2007), hired by iDev
  • Marjan Ghajar-Azadanlou (Diploma RWTH Aachen, 2007)
  • Michael Müter (Diploma RWTH Aachen, 2007), hired by DaimlerChrysler Research
  • Klaus Kröner (Diploma RWTH Aachen, 2007), hired by Atos Worldline, Aachen
  • Frank van der Beek (Diploma RWTH Aachen, 2007), started at Bundesstelle für Informationstechnik, BVA Köln
  • Christian Mertens (Diploma RWTH Aachen, 2007), hired by ComConsult Beratung und Planung GmbH, Aachen
  • Ali Ikinci (Diploma Uni Mannheim, 2007), hired by ContentKeeper Technologies
  • Christian Lambertz (Diploma RWTH Aachen, 2007), started PhD at University of Mannheim
  • Frank Zimmer (Bachelor Uni Mannheim, 2007), started joint Master programme at FH Mannheim and PH Heidelberg
  • Marek Jawurek (Diploma RWTH Aachen, 2008), hired by Fraunhofer IESE, Kaiserslautern
  • Markus de Brün (Diploma RWTH Aachen, 2008), hired by BSI, Referat für Internetsicherheit, Bonn
  • Jörg Lenz (Bachelor Uni Mannheim, 2008), hired by Erdt Systems GmbH
  • Jan Joy (Diplom Uni Mannheim, 2008), hired by mindsquare GmbH
  • Sebastian Kreuther (Bachelor Uni Mannheim, 2008), hired by Rechenzentrum der Universität Mannheim
  • Sebastian Hajok (Diploma, Uni Mannheim, 2008), hired by Deutsche Börse AG
  • Thomas Badura (Diploma, Uni Mannheim, 2008), hired by Communology.com
  • Jose Marquez (Diploma, Uni Mannheim, 2008), hired by SAP
  • Ernest Hammerschmidt (Diploma, RWTH Aachen, 2009), hired by secunet AG
  • Hanno Middelhaufe (Diploma, RWTH Aachen, 2009), hired by ALDI Einkauf GmbH & Co. oHG
  • Alexander Pfister (Diploma, Uni Mannheim, 2009), hired by Universität Mannheim
  • Romi Sorge (Bachelor, Uni Mannheim, 2009), started Master in Computer Science at Uni Bremen
  • Felix Gröbert (Diploma, Ruhr-Universität Bochum, 2010), hired by Google Zürich, Switzerland
  • Simon Schork (Diploma, Uni Mannheim, 2010), hired by Treasury Intelligence Solutions GmbH, Bad Schönborn
  • Johannes Grohmüller (Bachelor, Uni Mannheim, 2011), hired by Tectum IT Solutions
  • Alexander Knaus (Diploma, Uni Mannheim, 2011), hired by SAP AG
  • Christian Zimmermann (Diploma, Uni Mannheim, 2011), started PhD at University of Freiburg

If you wish your name to be added to the list, contact any member of the group.
 

Collection of famous citations

"Neuinstallieren skaliert nicht." (Thorsten Holz, June 18, 2008)

"People have said that computing is a fast moving subject and what they mean is that the wheel of re-incarnation goes faster."
 (Roger Needham in a SIGSOFT interview)

"Der Browser ist ein dreckiges Objekt mit vielen unangenehmen Eigenschaften." (Martin Johns, March 8, 2012)

 

My GPG Public Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.9 (MingW32)

mQGiBEoLU9oRBADKQyLU2FUMSOHEZfoi7rpcqlQX7sPJB6IRczFqHnU3RP0zt7nY
LVVE8XdmuWXx9f2BHHB7JOkv14cAyr953f/TJUQ8dljFUQs3rgBMW0eDsYxZ+TB1
qQDLjwlOqV5wDMsM8id/MlqaIQINy/0sdZmW+6UseSVKiWwL1lpwNXGwTwCg9L8c
WdomGaJo/dobYnk792Ml1lUD+QElv2jiQzEUTgjN8QIYgI4Le76ATU+nhcr4y+AG
4oBEnk6uZ+1iGByd6qY/3LKKhLkbGpD++Yf4PFksdY+z9/Ht1xFgLxj+eATFBzg6
ntk9LK06LxOJBx56qUoZ0m8JJVZozYlGiAe26h9snHlDmZ/moOmutALlAVSy7xJy
uNVoA/0d/F1yzqRkTHzY/SuQ74dyBoEDjE8TfNujjhEPI1zqdxv+QedJO4TboNZo
zJhCUpcTaUxIB8bf8VnphSY7sSA/ebnHeXpqE6ZxiedalKj7CmqkfAa129YEjdmp
8zQreYrfOHECR/UuCs9KYk2YTNP4tuBI5rwk/+wo1j1SjM3MUrQ6RmVsaXggRnJl
aWxpbmcgPGZlbGl4LmZyZWlsaW5nQGluZm9ybWF0aWsudW5pLWVybGFuZ2VuLmRl
PohoBBMRAgAoBQJN3T6FAhsjBQkJZgGABgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIX
gAAKCRCeLsRaN8H87k3qAKDkKR3NP3dT7uWS+uY3CrPTXhHnhgCePRo6Y21bB7mL
x5CFrmzidW7szBa0KUZlbGl4IEZyZWlsaW5nIDxmcmVpbGluZ0B1bmktbWFubmhl
aW0uZGU+iGYEExECACYFAkoLU9oCGyMFCQlmAYAGCwkIBwMCBBUCCAMEFgIDAQIe
AQIXgAAKCRCeLsRaN8H87mjcAJ9h4qrI4z3jhKsaeFI864TW1/0/uACcDvaFAYoC
IZo36gAkIIvwc0l2y0K0KUZlbGl4IEZyZWlsaW5nIDxmZWxpeC5mcmVpbGluZ0Bj
cy5mYXUuZGU+iGYEExECACYFAk99USACGyMFCQlmAYAGCwkIBwMCBBUCCAMEFgID
AQIeAQIXgAAKCRCeLsRaN8H87rYdAKDGG3NdV7fvkimceJCQSsMGTpWxkwCdE1OO
tKnpJ9y209bt+C+ZPrHVCd+5Ag0ESgtT2hAIAO7dBwXbAiWpKBpg4A4XvWVuNbbY
64pIwxiGfUaR1HLZWlygZM2uhsj12Op0pTSBPfzNDIzLGFySIqJ2d8nWzL8X9vWO
LRaTirtYe90gy0RbN+7wGLce3zIli5spXqzlSayrAbh6QaZKB8AnWdKpMb4DC2VV
HHlEF+WmAVVflnjbDKKdzLCmVJ+hDSowIdq6z7DNoJW1pnj1vnOcpUaA+fjv5jYw
KGBJ6rkoiXowGtidXVsvVW+putyYmOE35inAkV596aAOLN+0n3nK8G5Oye3zJoH3
naSu2ECVLmvSFB7llR7Fq9QPDU10zWuyG0E3S0yD69VzrTB9DseB/dZF3IcAAwUI
ANSmyEZ8At7r2TddbM3Y8Ruu0knRWhgk57llMBKLVZ7bmOVo77XkRsWg/X5BAWVy
c3YK6xRPYlcVexxwByX/LReaJXFXo40llfUIjde5yeYXlCRxAvma+Nuhm0NyCvih
9TuH7o9Tmj8mak5djF5tQyr2QDazdiVzeJDDdWrfyRSqQ/LNDOsZ5rDDyRA5eHs3
S8G00JSs8OHDGFpgyJdNFpgYZ1gyaFV1710gDKBgwBZM5icr2IJUowIBgwTpn1iX
VJXCg0uzo9bP+SZmB4dMhnqQ1mwuzcU1A8pZvwYNqpX7/kEFVKcoTBgb6nbo+RJZ
Tvj2doA8yoHr8z1le4iP3fuITwQYEQIADwUCSgtT2gIbDAUJCWYBgAAKCRCeLsRa
N8H87u0wAJ9C0Hof6ZFJO7DqFX4JWa+zwdTbcwCdFMYxhwUhACyCU056A7YPLoNb
bRw=
=tSM6
-----END PGP PUBLIC KEY BLOCK-----

 

Statistics

My Erdös number is at most 3 (the path is via Matthias Kirchner and Pete Winkler). If you work(ed) in fault-tolerant distributed computing and want to know your Erdös number, check your collaboration distance to (for example) Shay Kutten, Shlomo Moran, Nicola Santoro or Gerard Tel; all have Erdös number 2.

My h-index is at least 25 (using Harzing's PoP application).

My most often cited paper is the 1999 ACM Computing Surveys article "Fundmentals of fault-tolerant distributed computing in asynchronous environments" (until 2010 around 220 citations).

 

Images of Felix Freiling

Here are some images of Felix Freiling to upset Google image search. One of the following images shows me. I encourage you to set up a website with a picture of a person and the name "Felix Freiling" associated to it. If you inform me, I will link to such pages from here (to increase the page rank). Here are (somewhat strange) examples (first and second)