Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sheffer and Symmetric Sheffer Boolean Functions under Various Functional Constructions., , , , and . Elektronische Informationsverarbeitung und Kybernetik, 24 (6): 251-266 (1988)An Optimal Parallel Algorithm for Generating Combinations., , and . Inf. Process. Lett., 33 (3): 135-139 (1989)On random and adaptive parallel generation of combinatorial objects.. Int. J. Comput. Math., 42 (3-4): 125-135 (1992)A Note on Determinig the 3-Dimensional Convex Hull of a Set of Points on a Mesh of Processors., , and . SWAT, volume 318 of Lecture Notes in Computer Science, page 154-162. Springer, (1988)Broadcast in Ad Hoc Networks., , and . Guide to Wireless Ad Hoc Networks, Springer, (2009)Randomized carrier-based sensor relocation in wireless sensor and robot networks., , , and . Ad Hoc Networks, 11 (7): 1951-1962 (2013)On a Proposed Divide-And-Conquer Minimal Spanning Tree Algorithm., and . BIT, 28 (4): 785-789 (1988)Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems., , , , and . IEEE/ACM Trans. Netw., 24 (2): 1052-1064 (2016)An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS., , , , and . IEEE Trans. Computers, 64 (7): 1819-1829 (2015)Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace., , and . IEEE Trans. Computers, 64 (1): 139-151 (2015)