Author of the publication

Constructing Evolutionary Trees in the Presence of Polymorphic Characters.

, , , and . SIAM J. Comput., 29 (1): 103-131 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EXACT: the experimental algorithmics computational toolkit., , , and . Experimental Computer Science, page 14. ACM, (2007)Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds., , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Timely Reporting of Heavy Hitters using External Memory., , , , , , , and . SIGMOD Conference, page 1431-1446. ACM, (2020)Scalable generation of graphs for benchmarking HPC community-detection algorithms., , , , , and . SC, page 73:1-73:14. ACM, (2019)k-Edge Failure Resilient Network Design., and . Electron. Notes Discret. Math., (2013)The Network Inhibition Problem. Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing, page 776--785. New York, NY, USA, ACM, (1993)The Asymmetric Median Tree - A New model for Building Consensus Trees., and . CPM, volume 1075 of Lecture Notes in Computer Science, page 234-252. Springer, (1996)Using advanced data structures to enable responsive security monitoring., , , , , , , , and . Clust. Comput., 25 (4): 2893-2914 (2022)Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks., , , and . Algorithmica, 61 (3): 518-554 (2011)Strengthening integrality gaps for capacitated network design and covering problems., , , and . SODA, page 106-115. ACM/SIAM, (2000)