From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Formal Framework for Evaluating Heuristic Programs., , и . Ann. Math. Artif. Intell., 22 (3-4): 193-206 (1998)Computation in a distributed information market., , , и . EC, стр. 156-165. ACM, (2003)An Approximate L1-Difference Algorithm for Massive Data Streams., , , и . SIAM J. Comput., 32 (1): 131-151 (2002)Probabilistically checkable debate systems and approximation algorithms for PSPACE-hard functions., , , и . STOC, стр. 305-314. ACM, (1993)Panel Session - Future Directions., , , , и . Security Protocols Workshop, том 1550 из Lecture Notes in Computer Science, стр. 227-239. Springer, (1998)On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do., и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 266-279. Springer, (2018)Approximation and collusion in multicast cost sharing., , , , и . Games Econ. Behav., 47 (1): 36-71 (2004)Flexibility as an Instrument in Digital Rights Management., , , и . WEIS, (2005)Information accountability., , , , , и . Commun. ACM, 51 (6): 82-87 (2008)Cryptographic Protection of Databases and Software., , и . Distributed Computing And Cryptography, том 2 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 161-172. DIMACS/AMS, (1989)