Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing the Guarded Boundary of an Art Gallery Is APX-Complete., , and . CIAC, volume 2653 of Lecture Notes in Computer Science, page 24-35. Springer, (2003)Mobile Agents Rendezvous in Spite of a Malicious Agent., , and . ALGOSENSORS, volume 9536 of Lecture Notes in Computer Science, page 211-224. Springer, (2015)Online Graph Exploration with Advice., , and . SIROCCO, volume 7355 of Lecture Notes in Computer Science, page 267-278. Springer, (2012)Distributed Routing in Tree Networks with Few Landmarks., , and . CAAN, volume 4235 of Lecture Notes in Computer Science, page 45-57. Springer, (2006)Gathering of robots in a ring with mobile faults., , , , and . Theor. Comput. Sci., (2019)Maximizing the guarded boundary of an Art Gallery is APX-complete., , and . Comput. Geom., 38 (3): 170-180 (2007)Searching for a Black Hole in Synchronous Tree Networks., , , and . Comb. Probab. Comput., 16 (4): 595-619 (2007)Dangerous Graphs., and . Distributed Computing by Mobile Entities, volume 11340 of Lecture Notes in Computer Science, Springer, (2019)Complexity of Searching for a Black Hole., , , and . Fundam. Informaticae, 71 (2-3): 229-242 (2006)Deterministic symmetric rendezvous with tokens in a synchronous torus., , and . Discret. Appl. Math., 159 (9): 896-923 (2011)