Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)Randomized rendezvous with limited memory., , and . ACM Trans. Algorithms, 7 (3): 34:1-34:12 (2011)Book review: Gems of Theoretical Computer Science by Uwe Schöning and Randall Pruim (Springer-Verlag, 1998).. SIGACT News, 31 (2): 2-5 (2000)Tight Bounds for Oblivious Routing in the Hypercube., , and . SPAA, page 31-36. ACM, (1990)On Recognizing a String on an Anonymous Ring., , and . Theory Comput. Syst., 34 (1): 3-12 (2001)Time-Message Trade-Offs for the Weak Unison Problem., , , and . CIAC, volume 778 of Lecture Notes in Computer Science, page 167-178. Springer, (1994)Implicit Routing and Shortest Path Information (Extended Abstract)., , and . SIROCCO, volume 2 of Proceedings in Informatics, page 101-112. Carleton Scientific, (1995)Boolean Routing on Chordal Rings., and . SIROCCO, volume 2 of Proceedings in Informatics, page 89-100. Carleton Scientific, (1995)Optimizing Web Server's Data Transfer with Hotlinks., , and . ICWI, page 341-346. IADIS, (2003)