Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Evaluation of a Graph Codec System for Software Watermarking., and . DATA, page 277-284. SciTePress, (2013)Detecting Holes and Antiholes in Graphs., and . Algorithmica, 47 (2): 119-138 (2007)NC Coloring Algorithms for Permutation Graphs., and . Nord. J. Comput., 6 (4): 422-445 (1999)Algorithms for P4-Comparability Graph Recognition and Acyclic P4-Transitive Orientation., and . Algorithmica, 39 (2): 95-126 (2004)Malicious software classification based on relations of system-call groups., and . Panhellenic Conference on Informatics, page 59-60. ACM, (2015)Colinear Coloring on Graphs., and . WALCOM, volume 5431 of Lecture Notes in Computer Science, page 117-128. Springer, (2009)Optimal Algorithms for Detecting Network Stability., , , and . WALCOM, volume 4921 of Lecture Notes in Computer Science, page 188-199. Springer, (2008)Harmonious Coloring on Subclasses of Colinear Graphs., and . WALCOM, volume 5942 of Lecture Notes in Computer Science, page 136-148. Springer, (2010)A graph-based model for malicious code detection exploiting dependencies of system-call groups., and . CompSysTech, page 228-235. ACM, (2015)Recognizing HHD-free and Welsh-Powell Opposition Graphs., and . WG, volume 3353 of Lecture Notes in Computer Science, page 105-116. Springer, (2004)