Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Untrusted Predictions Improve Trustable Query Policies., , , , and . CoRR, (2020)Network Analysis, and . Springer-Verlag Berlin/Heidelberg, New York, (2005)A Game of Cops and Robbers on Graphs with Periodic Edge-Connectivity., and . CoRR, (2019)Package Delivery Using Drones with Restricted Movement Areas., , and . ISAAC, volume 248 of LIPIcs, page 49:1-49:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Sorting and Hypergraph Orientation under Uncertainty with Predictions., , , and . IJCAI, page 5577-5585. ijcai.org, (2023)Algorithms that Access the Input via Queries.. SOFSEM, volume 12607 of Lecture Notes in Computer Science, page 3-12. Springer, (2021)Online Scheduling of Car-Sharing Requests Between Two Locations with Many Cars and Flexible Advance Bookings., , and . ISAAC, volume 123 of LIPIcs, page 64:1-64:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)A Game of Cops and Robbers on Graphs with Periodic Edge-Connectivity., and . SOFSEM, volume 12011 of Lecture Notes in Computer Science, page 64-75. Springer, (2020)Call Control in Rings., , , and . ICALP, volume 2380 of Lecture Notes in Computer Science, page 788-799. Springer, (2002)An Adversarial Model for Scheduling with Testing., , , and . Algorithmica, 82 (12): 3630-3675 (2020)