From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Complexities for generalized models of self-assembly., , , и . SODA, стр. 880-889. SIAM, (2004)The load rebalancing problem., , и . SPAA, стр. 258-265. ACM, (2003)Vision Paper: Enabling Privacy for the Paranoids., , , , , , , , , и 1 other автор(ы). VLDB, стр. 708-719. Morgan Kaufmann, (2004)Two Can Keep A Secret: A Distributed Architecture for Secure Database Services., , , , , , , , и . CIDR, стр. 186-199. www.cidrdb.org, (2005)No-Regret Algorithms in non-Truthful Auctions with Budget and ROI Constraints., , и . CoRR, (2024)On Identifying Stable Ways to Configure Systems., , , и . ICAC, стр. 148-153. IEEE Computer Society, (2004)Algorithms for the Database Layout Problem., , , , и . ICDT, том 3363 из Lecture Notes in Computer Science, стр. 189-203. Springer, (2005)Algorithms for Multi-product Pricing., , , и . ICALP, том 3142 из Lecture Notes in Computer Science, стр. 72-83. Springer, (2004)Autobidding with Constraints., , и . WINE, том 11920 из Lecture Notes in Computer Science, стр. 17-30. Springer, (2019)Secure Computation of the k th-Ranked Element., , и . EUROCRYPT, том 3027 из Lecture Notes in Computer Science, стр. 40-55. Springer, (2004)