Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Good characterizations and linear time recognition for 2-probe block graphs., and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 22-31. IOS Press, (2014)Green Computing: An SLA-based Energy-aware Methodology for Data Centers., , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1345-1354. IOS Press, (2014)Assessment of Protein-Graph Remodeling via Conformational Graph Entropy., and . ICIC (3), volume 375 of Communications in Computer and Information Science, page 43-48. Springer, (2013)On the complete width and edge clique cover problems., and . CoRR, (2016)On the d-Claw Vertex Deletion Problem., , and . COCOON, volume 13025 of Lecture Notes in Computer Science, page 591-603. Springer, (2021)Graph Searching on Some Subclasses of Chordal Graphs., , , , and . Algorithmica, 27 (3): 395-426 (2000)On the Treewidth and Pathwidth of Biconvex Bipartite Graphs., and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 244-255. Springer, (2007)Good characterizations and linear time recognition for 2-probe block graphs., and . Discret. Appl. Math., (2017)Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph., , and . J. Vis. Commun. Image Represent., (2018)Proportional fault-tolerant data mining with applications to bioinformatics., , and . Inf. Syst. Frontiers, 11 (4): 461-469 (2009)