User profiles for Christian Haack
Christian HaackPostdoctoral Researcher, ECAP, FAU Erlangen-Nürnberg Verified email at fau.de Cited by 19125 |
Neutrino emission from the direction of the blazar TXS 0506+ 056 prior to the IceCube-170922A alert
A high-energy neutrino event detected by IceCube on 22 September 2017 was coincident in
direction and time with a gamma-ray flare from the blazar TXS 0506+056. Prompted by this …
direction and time with a gamma-ray flare from the blazar TXS 0506+056. Prompted by this …
Multimessenger observations of a flaring blazar coincident with high-energy neutrino IceCube-170922A
…, J Gonzalez, D Grant, Z Griffith, C Haack… - Science, 2018 - science.org
INTRODUCTION Neutrinos are tracers of cosmic-ray acceleration: electrically neutral and
traveling at nearly the speed of light, they can escape the densest environments and may be …
traveling at nearly the speed of light, they can escape the densest environments and may be …
High-energy and ultra-high-energy neutrinos: A Snowmass white paper
…, D Fox, E Ganster, MH Minh, C Haack… - Journal of high energy …, 2022 - Elsevier
Astrophysical neutrinos are excellent probes of astroparticle physics and high-energy physics.
With energies far beyond solar, supernovae, atmospheric, and accelerator neutrinos, high-…
With energies far beyond solar, supernovae, atmospheric, and accelerator neutrinos, high-…
A measurement of the diffuse astrophysical muon neutrino flux using eight years of IceCube data.
C Haack, C Wiebusch… - 35th International Cosmic …, 2018 - pos.sissa.it
Recently the IceCube collaboration confirmed the astrophysical neutrino flux in the muon
neutrino channel with high significance using six years of data. This analysis used a likelihood …
neutrino channel with high significance using six years of data. This analysis used a likelihood …
In situ estimation of ice crystal properties at the South Pole using LED calibration data from the IceCube Neutrino Observatory
The IceCube Neutrino Observatory instruments about 1 km 3 of deep, glacial ice at the
geographic South Pole. It uses 5160 photomultipliers to detect Cherenkov light emitted by …
geographic South Pole. It uses 5160 photomultipliers to detect Cherenkov light emitted by …
Type error slicing in implicitly typed higher-order languages
C Haack, JB Wells - Science of Computer Programming, 2004 - Elsevier
Previous methods have generally identified the location of a type error as a particular
program point or the program subtree rooted at that point. We present a new approach that …
program point or the program subtree rooted at that point. We present a new approach that …
The impact of digital contact tracing on the SARS-CoV-2 pandemic—a comprehensive modelling study
Contact tracing is one of several strategies employed in many countries to curb the spread
of SARS-CoV-2. Digital contact tracing (DCT) uses tools such as cell-phone applications to …
of SARS-CoV-2. Digital contact tracing (DCT) uses tools such as cell-phone applications to …
Permission-based separation logic for multithreaded Java programs
This paper presents a program logic for reasoning about multithreaded Java-like programs
with dynamic thread creation, thread joining and reentrant object monitors. The logic is based …
with dynamic thread creation, thread joining and reentrant object monitors. The logic is based …
Type error slicing in implicitly typed higher-order languages
C Haack, JB Wells - European Symposium on Programming, 2003 - Springer
Previous methods have generally identified the location of a type error as a particular
program point or the program subtree rooted at that point. We present a new approach that …
program point or the program subtree rooted at that point. We present a new approach that …
Reasoning about Java's reentrant locks
C Haack, M Huisman, C Hurlin - Asian Symposium on Programming …, 2008 - Springer
This paper presents a verification technique for a concurrent Java-like language with reentrant
locks. The verification technique is based on permissionaccounting separation logic. As …
locks. The verification technique is based on permissionaccounting separation logic. As …