Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight Bounds for Oblivious Routing in the Hypercube., , and . SPAA, page 31-36. ACM, (1990)Asymptotic structural properties of quasi-random saturated structures of RNA., , and . Algorithms Mol. Biol., (2013)Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Randomized rendezvous with limited memory., , and . ACM Trans. Algorithms, 7 (3): 34:1-34:12 (2011)On Recognizing a String on an Anonymous Ring., , and . Theory Comput. Syst., 34 (1): 3-12 (2001)A Time-Randomness Tradeoff for Oblivious Routing (Extended Abstract), , and . STOC, page 93-102. ACM, (1988)On Multi-Label Linear Interval Routing Schemes (Extended Abstract)., , and . WG, volume 790 of Lecture Notes in Computer Science, page 338-349. Springer, (1993)Power Consumption in Packet Radio Networks (Extended Abstract)., , , and . STACS, volume 1200 of Lecture Notes in Computer Science, page 363-374. Springer, (1997)A Time-Randomness Tradeoff for Selection in Parallel.. WADS, volume 709 of Lecture Notes in Computer Science, page 464-470. Springer, (1993)