Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using advanced data structures to enable responsive security monitoring., , , , , , , , and . Clust. Comput., 25 (4): 2893-2914 (2022)Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds., , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Timely Reporting of Heavy Hitters using External Memory., , , , , , , and . SIGMOD Conference, page 1431-1446. ACM, (2020)Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks., , , and . Algorithmica, 61 (3): 518-554 (2011)Strengthening integrality gaps for capacitated network design and covering problems., , , and . SODA, page 106-115. ACM/SIAM, (2000)Scalable generation of graphs for benchmarking HPC community-detection algorithms., , , , , and . SC, page 73:1-73:14. ACM, (2019)The Asymmetric Median Tree - A New model for Building Consensus Trees., and . CPM, volume 1075 of Lecture Notes in Computer Science, page 234-252. Springer, (1996)The Network Inhibition Problem. Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing, page 776--785. New York, NY, USA, ACM, (1993)k-Edge Failure Resilient Network Design., and . Electron. Notes Discret. Math., (2013)EXACT: the experimental algorithmics computational toolkit., , , and . Experimental Computer Science, page 14. ACM, (2007)