Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The (not so) Critical Nodes of Criminal Networks., , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 87-96. Springer, (2014)2D Color Barcodes for Mobile Phones., , , and . Int. J. Comput. Sci. Appl., 8 (1): 136-155 (2011)Sparse certificates for 2-connectivity in directed graphs., , , , and . Theor. Comput. Sci., (2017)Concurrent Algorithms and Data Types Animation over the Internet., , , and . IFIP Congress: Fundamentals - Foundations of Computer Science, volume 117 of books@ocg.at, page 63-80. Austrian Computer Society, (1998)A new approach to dynamic all pairs shortest paths., and . STOC, page 159-166. ACM, (2003)Sorting and searching in the presence of memory faults (without redundancy)., and . STOC, page 101-110. ACM, (2004)All-Pairs $2$-reachability in Õ(nω) Time., , , , and . CoRR, (2016)Computing 2-Connected Components and Maximal 2-Connected Subgraphs in Directed Graphs: An Experimental Study., , , , and . ALENEX, page 169-183. SIAM, (2018)Extracting social networks from seized smartphones and web data., , , and . WIFS, page 101-105. IEEE, (2009)New Algorithms for Examination Timetabling., , and . WAE, volume 1982 of Lecture Notes in Computer Science, page 230-242. Springer, (2000)