Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel TCP/IP for Multiprocessor Workstations., , , , , , and . HPN, volume C-14 of IFIP Transactions, page 103-118. North-Holland, (1992)Asymmetric k-center is log* n-hard to approximate., , , , , and . STOC, page 21-27. ACM, (2004)Power-Conserving Computation of Order-Statistics over Sensor Networks., and . PODS, page 275-285. ACM, (2004)Approximating pure nash equilibrium in cut, party affiliation, and satisfiability games., , and . EC, page 73-82. ACM, (2010)Locating and Capturing an Evader in a Polygonal Environment., , and . WAFR, volume 17 of Springer Tracts in Advanced Robotics, page 251-266. Springer, (2004)Mechanism Design for a Risk Averse Seller., , and . WINE, volume 7695 of Lecture Notes in Computer Science, page 198-211. Springer, (2012)A Utility Equivalence Theorem for Concave Functions., and . IPCO, volume 8494 of Lecture Notes in Computer Science, page 126-137. Springer, (2014)Logic Programming for Software Testing.. ICCI, volume 468 of Lecture Notes in Computer Science, page 225-234. Springer, (1990)Algorithms for 2-Route Cut Problems., and . ICALP (1), volume 5125 of Lecture Notes in Computer Science, page 472-484. Springer, (2008)To Show or Not to Show in Workflow Provenance., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 217-226. Springer, (2013)