Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Wireless Rings., , , and . Theor. Comput. Sci., 145 (1&2): 95-109 (1995)Gathering asynchronous oblivious mobile robots in a ring., , and . Theor. Comput. Sci., 390 (1): 27-39 (2008)Universally Fault-Tolerant Broadcasting in Trees., and . ICPADS, page 724-729. IEEE Computer Society, (1997)Deterministic Graph Exploration with Advice., and . ICALP, volume 80 of LIPIcs, page 132:1-132:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Exploration of Faulty Hamiltonian Graphs., and . CoRR, (2016)Use of Information, Memory and Randomization in Asynchronous Gathering.. CoRR, (2017)Consensus and Mutual Exclusion in a Multiple Access Channel., , , and . DISC, volume 5805 of Lecture Notes in Computer Science, page 512-526. Springer, (2009)Sparse Networks Supporting Efficient Reliable Broadcasting., , and . ICALP, volume 700 of Lecture Notes in Computer Science, page 388-397. Springer, (1993)Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports., and . ICALP (2), volume 7392 of Lecture Notes in Computer Science, page 500-512. Springer, (2012)Learning a Ring Cheaply and Fast., , and . ICALP (2), volume 7966 of Lecture Notes in Computer Science, page 557-568. Springer, (2013)