Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic Graph Exploration with Advice., and . ICALP, volume 80 of LIPIcs, page 132:1-132:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Exploration of Faulty Hamiltonian Graphs., and . CoRR, (2016)Use of Information, Memory and Randomization in Asynchronous Gathering.. CoRR, (2017)Anonymous Wireless Rings., , , and . Theor. Comput. Sci., 145 (1&2): 95-109 (1995)Gathering asynchronous oblivious mobile robots in a ring., , and . Theor. Comput. Sci., 390 (1): 27-39 (2008)Computing Functions by Teams of Deterministic Finite Automata., and . CoRR, (2023)Broadcasting with linearly bounded transmission faults., and . Discret. Appl. Math., 83 (1-3): 121-133 (1998)Labeling trees with a condition at distance two., , and . Discret. Math., 306 (14): 1534-1539 (2006)Gathering despite mischief., , and . SODA, page 527-540. SIAM, (2012)Anonymous Meeting in Networks., and . SODA, page 737-747. SIAM, (2013)