Author of the publication

Minimum-Weight Spanning Tree Construction in O(log log n) Communication Rounds.

, , , and . SIAM J. Comput., 35 (1): 120-131 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

eye-q: eyeglass peripheral display for subtle intimate notifications., , , , and . Mobile HCI, page 211-218. ACM, (2006)A Generic Scheme for Building Overlay Networks in Adversarial Scenarios., , , , , and . IPDPS, page 40. IEEE Computer Society, (2003)Towards Virtualization of On-Demand Web Service Composition Using an Improved Ranking Algorithm., , , and . International Conference on Internet Computing, page 817-823. CSREA Press, (2004)Mechanisms for a spatially distributed market., , and . EC, page 9-20. ACM, (2004)Anonymity without 'Cryptography'., and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 108-126. Springer, (2001)E-Voting Without 'Cryptography'., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 1-15. Springer, (2002)An Efficient PAC Algorithm for Reconstructing a Mixture of Lines., , and . ALT, volume 2533 of Lecture Notes in Computer Science, page 351-364. Springer, (2002)Impersonation-Based Mechanisms., , and . AAAI, page 592-597. AAAI Press, (2006)Supporting Privacy in Decentralized Additive Reputation Systems., , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 108-119. Springer, (2004)An incentive-compatible multi-armed bandit mechanism., and . PODC, page 362-363. ACM, (2007)