Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implicit CAPTCHAs., and . DRR, volume 5676 of SPIE Proceedings, page 191-196. SPIE, (2005)Fast Algorithms for Sorting and Searching Strings., and . SODA, page 360-369. ACM/SIAM, (1997)Some Unexpected Expected Behavior Results for Bin Packing, , , , and . STOC, page 279-288. ACM, (1984)On the Average Number of Maxima in a Set of Vectors and Applications., , , and . J. ACM, 25 (4): 536-543 (1978)Approximation Algorithms for Convex Hulls., , and . Commun. ACM, 25 (1): 64-68 (1982)A Worst-Case Analysis of Nearest Neighbor Searching by Projection., and . ICALP, volume 85 of Lecture Notes in Computer Science, page 470-482. Springer, (1980)How Much Assurance Does a PIN Provide?, and . HIP, volume 3517 of Lecture Notes in Computer Science, page 111-126. Springer, (2005)Transforming Static Data Structures to Dynamic Structures (Abridged Version), and . FOCS, page 148-168. IEEE Computer Society, (1979)K-d Trees for Semidynamic Point Sets.. SCG, page 187-197. ACM, (1990)The NAG Library 'Machine'., , , and . Softw. Pract. Exp., 9 (1): 65-72 (1979)