Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Multi-Dimensional Packing Problems., and . SODA, page 185-194. ACM/SIAM, (1999)Parallel TCP/IP for Multiprocessor Workstations., , , , , , and . HPN, volume C-14 of IFIP Transactions, page 103-118. North-Holland, (1992)Power-Conserving Computation of Order-Statistics over Sensor Networks., and . PODS, page 275-285. ACM, (2004)Asymmetric k-center is log* n-hard to approximate., , , , , and . STOC, page 21-27. ACM, (2004)Approximating pure nash equilibrium in cut, party affiliation, and satisfiability games., , and . EC, page 73-82. ACM, (2010)A Formal Investigation of., , and . FSTTCS, volume 4855 of Lecture Notes in Computer Science, page 485-496. Springer, (2007)Data Provenance: Some Basic Issues., , and . FSTTCS, volume 1974 of Lecture Notes in Computer Science, page 87-93. Springer, (2000)Mechanism Design for a Risk Averse Seller., , and . WINE, volume 7695 of Lecture Notes in Computer Science, page 198-211. Springer, (2012)To Show or Not to Show in Workflow Provenance., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 217-226. Springer, (2013)Logic Programming for Software Testing.. ICCI, volume 468 of Lecture Notes in Computer Science, page 225-234. Springer, (1990)