Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymptotically Optimal Encodings of Range Data Structures for Selection and Top-k Queries., , , , and . ACM Trans. Algorithms, 13 (2): 28:1-28:31 (2017)An optimal Bloom filter replacement., , and . SODA, page 823-829. SIAM, (2005)Representing Trees of Higher Degree., , , , , and . Algorithmica, 43 (4): 275-292 (2005)Succinct Representations of Permutations and Functions, , , and . CoRR, (2011)Succinct Representations of Permutations., , , and . ICALP, volume 2719 of Lecture Notes in Computer Science, page 345-356. Springer, (2003)Ideal frequency rendezvousing for multiuser communication (IFRMC) over cognitive radio network., , and . Int. J. Speech Technol., 23 (3): 537-547 (2020)Succinct representations of permutations and functions., , , and . Theor. Comput. Sci., (2012)Two Dimensional Range Minimum Queries and Fibonacci Lattices., , , , and . ESA, volume 7501 of Lecture Notes in Computer Science, page 217-228. Springer, (2012)ASAF ALOHA Protocol for Dense RFID Systems., , and . Wireless Personal Communications, 66 (4): 667-681 (2012)Succinct indexable dictionaries with applications to encoding k-ary trees and multisets., , and . SODA, page 233-242. ACM/SIAM, (2002)