Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking Mobile Users in Cellular Networks using Timing Information., , and . Nord. J. Comput., 14 (3): 202-215 (2008)Implicit Routing and Shortest Path Information (Extended Abstract)., , and . SIROCCO, volume 2 of Proceedings in Informatics, page 101-112. Carleton Scientific, (1995)Boolean Routing on Chordal Rings., and . SIROCCO, volume 2 of Proceedings in Informatics, page 89-100. Carleton Scientific, (1995)Optimizing Web Server's Data Transfer with Hotlinks., , and . ICWI, page 341-346. IADIS, (2003)Tight Bounds for Oblivious Routing in the Hypercube., , and . SPAA, page 31-36. ACM, (1990)Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)On Recognizing a String on an Anonymous Ring., , and . Theory Comput. Syst., 34 (1): 3-12 (2001)Time-Message Trade-Offs for the Weak Unison Problem., , , and . CIAC, volume 778 of Lecture Notes in Computer Science, page 167-178. Springer, (1994)Memoryless search algorithms in a network with faulty advice., , , and . Theor. Comput. Sci., 402 (2-3): 190-198 (2008)