Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stewardship of personal data on social networking sites., , , , , and . Int. J. Inf. Manag., (2021)Computation under Uncertainty: From Online Algorithms to Search Games and Interruptible Systems.. (2020)Stochastic dominance and the bijective ratio of online algorithms., , and . CoRR, (2016)On the Separation and Equivalence of Paging Strategies and Other Online Algorithms., , and . Algorithmica, 81 (3): 1152-1179 (2019)Randomized Priority Algorithms: (Extended Abstract).. WAOA, volume 2909 of Lecture Notes in Computer Science, page 27-40. Springer, (2003)On-Line Algorithms for Market Equilibria., , , and . COCOON, volume 3595 of Lecture Notes in Computer Science, page 596-607. Springer, (2005)Further Connections Between Contract-Scheduling and Ray-Searching Problems.. IJCAI, page 1516-1522. AAAI Press, (2015)Online Computation with Untrusted Advice., , , , and . ITCS, volume 151 of LIPIcs, page 52:1-52:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Small Fish in a Big Pond: An Architectural Approach to Users Privacy, Rights and Security in the Age of Big Data., , , , and . ICIS, Association for Information Systems, (2016)Multi-target ray searching problems., , and . Theor. Comput. Sci., (2014)