Author of the publication

New Algorithms for Two-Label Point Labeling.

, , , and . ESA, volume 1879 of Lecture Notes in Computer Science, page 368-379. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximations for Two Decomposition-Based Geometric Optimization Problems., , , , and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 90-98. Springer, (2004)Secure Systolic Montgomery Modular Multiplier Over Prime Fields Resilient to Fault-Injection Attacks., , and . IEEE Trans. Very Large Scale Integr. Syst., 23 (9): 1889-1902 (2015)New Bounds on Map Labeling with Circular Labels., , , and . ISAAC, volume 3341 of Lecture Notes in Computer Science, page 606-617. Springer, (2004)A Factor-2 Approximation for Labeling Points with Maximum Sliding Labels., and . SWAT, volume 2368 of Lecture Notes in Computer Science, page 100-109. Springer, (2002)On Some Optimization Problems in Obnoxious Facility Location., , and . COCOON, volume 1858 of Lecture Notes in Computer Science, page 320-329. Springer, (2000)Cryptanalysis of Spent with Systems of Algebraic Equations., , and . CSSE (4), page 1097-1100. IEEE Computer Society, (2008)978-0-7695-3336-0.Secure systolic architecture for montgomery modular multiplication algorithm., , and . ASICON, page 1-4. IEEE, (2013)Secure systolic Montgomery modular multiplier resilient to Hardware Trojan and Fault-Injection attacks., and . CITS, page 1-5. IEEE, (2013)