Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing the Guarded Boundary of an Art Gallery Is APX-Complete., , and . CIAC, volume 2653 of Lecture Notes in Computer Science, page 24-35. Springer, (2003)Mobile Agents Rendezvous in Spite of a Malicious Agent., , and . ALGOSENSORS, volume 9536 of Lecture Notes in Computer Science, page 211-224. Springer, (2015)Stathis Zachos at 70!, , , , , , , , , and 1 other author(s). CIAC, volume 10236 of Lecture Notes in Computer Science, page 469-484. (2017)How to Place Efficiently Guards and Paintings in an Art Gallery., , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 145-154. Springer, (2005)Complexity of Searching for a Black Hole., , , and . Fundam. Informaticae, 71 (2-3): 229-242 (2006)Gathering of Robots in a Grid with Mobile Faults., , , and . SOFSEM, volume 11376 of Lecture Notes in Computer Science, page 164-178. Springer, (2019)Black Virus Decontamination of Synchronous Ring Networks by Initially Scattered Mobile Agents., , and . SIROCCO, volume 12156 of Lecture Notes in Computer Science, page 220-236. Springer, (2020)Distributed Routing in Tree Networks with Few Landmarks., , and . CAAN, volume 4235 of Lecture Notes in Computer Science, page 45-57. Springer, (2006)Online Graph Exploration with Advice., , and . SIROCCO, volume 7355 of Lecture Notes in Computer Science, page 267-278. Springer, (2012)Emergency Connectivity in Ad-hoc Networks with Selfish Nodes., and . Algorithmica, 68 (2): 358-389 (2014)