Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymptotic structural properties of quasi-random saturated structures of RNA., , and . Algorithms Mol. Biol., (2013)Maximum Interference of Random Sensors on a Line., , , and . SIROCCO, volume 6058 of Lecture Notes in Computer Science, page 197-210. Springer, (2010)Time-Message Trade-Offs for the Weak Unison Problem., , , and . CIAC, volume 778 of Lecture Notes in Computer Science, page 167-178. Springer, (1994)Tight Bounds for Oblivious Routing in the Hypercube., , and . Math. Syst. Theory, 24 (4): 223-232 (1991)Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)Randomized rendezvous with limited memory., , and . ACM Trans. Algorithms, 7 (3): 34:1-34:12 (2011)Book review: Gems of Theoretical Computer Science by Uwe Schöning and Randall Pruim (Springer-Verlag, 1998).. SIGACT News, 31 (2): 2-5 (2000)Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Randomized Rendez-Vous with Limited Memory., , and . LATIN, volume 4957 of Lecture Notes in Computer Science, page 605-616. Springer, (2008)Satisfying Neighbor Preferences on a Circle., , , , and . LATIN, volume 10807 of Lecture Notes in Computer Science, page 727-740. Springer, (2018)