Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Connectivity properties of secure wireless sensor networks., , , , and . SASN, page 53-58. ACM, (2004)Rumor Spreading and Conductance., , , and . J. ACM, 65 (4): 17:1-17:21 (2018)The Limits of Popularity-Based Recommendations, and the Role of Social Ties., , , , and . KDD, page 745-754. ACM, (2016)Randomized Wait-Free Naming., , , and . ISAAC, volume 834 of Lecture Notes in Computer Science, page 83-91. Springer, (1994)Fast Hare: A Fast Heuristic for Single Individual SNP Haplotype Reconstruction., and . WABI, volume 3240 of Lecture Notes in Computer Science, page 266-277. Springer, (2004)On the Hardness of Allocating Frequencies for Hybrid Networks., and . WG, volume 1197 of Lecture Notes in Computer Science, page 308-322. Springer, (1996)Announcing the 2012 Edsger W. Dijkstra prize in distributed computing., , , , , and . SIGARCH Comput. Archit. News, 40 (4): 1-2 (2012)On the Hardness of Approximating Max k-Cut and its Dual., , , and . Chic. J. Theor. Comput. Sci., (1997)Trainyard is NP-hard., , and . FUN, volume 49 of LIPIcs, page 2:1-2:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Concentration of Measure for the Analysis of Randomized Algorithms, and . (2009)