Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet Security Aesthetics: Can internet transparency afford social trust?, and . ICCCN, page 1-2. IEEE, (2022)Heuristics for the Score-Constrained Strip-Packing Problem., , and . COCOA, volume 11346 of Lecture Notes in Computer Science, page 449-462. Springer, (2018)Soft happy colourings and community structure of networks., , , and . CoRR, (2024)Creating seating plans: a practical application., and . J. Oper. Res. Soc., 67 (11): 1353-1362 (2016)Determining Fixed-Length Paths in Directed and Undirected Edge-Weighted Graphs., , and . SEA, volume 301 of LIPIcs, page 15:1-15:11. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)A user-centric model of connectivity in street networks., and . Comput. Oper. Res., (2025)A heuristic algorithm for finding cost-effective solutions to real-world school bus routing problems., and . J. Discrete Algorithms, (2018)Exact Algorithms for Finding Fixed-Length Cycles in Edge-Weighted Graphs., and . ICCCN, page 1-2. IEEE, (2022)Methods for determining cycles of a specific length in undirected graphs with edge weights., , and . J. Comb. Optim., 46 (5): 29 (December 2023)Digraphs and k-Domination Models for Facility Location Problems in Road Networks: Greedy Heuristics., , , and . INOC, page 22-27. OpenProceedings.org, (2024)