Author of the publication

Adversary Games in Secure/Reliable Network Routing.

, , , and . GAMENETS, volume 75 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 249-264. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Range Assignment for High Connectivity in Wireless Ad Hoc Networks., and . ADHOC-NOW, volume 2865 of Lecture Notes in Computer Science, page 235-246. Springer, (2003)Client assignment problems for latency minimization., and . J. Comb. Optim., 37 (3): 889-900 (2019)Approximation Algorithms For Multipath Setup., , and . GLOBECOM, page 438-442. IEEE, (2007)Multiway Cut.. Encyclopedia of Algorithms, Springer, (2008)Improved Approximation Algorithms for Resource Allocation., , , and . IPCO, volume 2337 of Lecture Notes in Computer Science, page 401-414. Springer, (2002)Reconfigurations in Graphs and Grids., , and . SIAM J. Discret. Math., 22 (1): 124-138 (2008)Minimizing electronic line terminals for automatic ring protection in general WDM optical networks., , and . IEEE J. Sel. Areas Commun., 20 (1): 183-189 (2002)Sequential Dependency Computation via Geometric Data Structures., and . CCCG, (2011)On the k-Structure Ratio in Planar and Outerplanar Graphs., and . Discret. Math. Theor. Comput. Sci., (2008)Bounded-hops power assignment in ad hoc wireless networks., , and . Discret. Appl. Math., 154 (9): 1358-1371 (2006)