Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)On Recognizing a String on an Anonymous Ring., , and . Theory Comput. Syst., 34 (1): 3-12 (2001)Tight Bounds for Oblivious Routing in the Hypercube., , and . SPAA, page 31-36. ACM, (1990)Book review: Gems of Theoretical Computer Science by Uwe Schöning and Randall Pruim (Springer-Verlag, 1998).. SIGACT News, 31 (2): 2-5 (2000)Randomized rendezvous with limited memory., , and . ACM Trans. Algorithms, 7 (3): 34:1-34:12 (2011)On Multi-Label Linear Interval Routing Schemes (Extended Abstract)., , and . WG, volume 790 of Lecture Notes in Computer Science, page 338-349. Springer, (1993)A Time-Randomness Tradeoff for Selection in Parallel.. WADS, volume 709 of Lecture Notes in Computer Science, page 464-470. Springer, (1993)Computing Boolean Functions on Anonymous Networks., , and . ICALP, volume 443 of Lecture Notes in Computer Science, page 254-267. Springer, (1990)Time-Message Trade-Offs for the Weak Unison Problem., , , and . CIAC, volume 778 of Lecture Notes in Computer Science, page 167-178. Springer, (1994)