Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-Line Algorithms for Locating Checkpoints., , , and . Algorithmica, 11 (1): 33-52 (1994)Data Compression with Finite Windows., and . Commun. ACM, 32 (4): 490-505 (1989)Adding linguistic constraints to document image decoding: comparing the iterated complete path and stack algorithms., , , and . Document Recognition and Retrieval, volume 4307 of SPIE Proceedings, page 259-271. SPIE, (2001)A Linear Algorithm for Optimal Context Clustering with Application to Bi-level Image Coding., , and . ICIP (1), page 508-511. IEEE Computer Society, (1998)Epidemic Algorithms for Replicated Database Maintenance., , , , , , , , and . ACM SIGOPS Oper. Syst. Rev., 22 (1): 8-32 (1988)Reliability of Adaptation Layers., and . Protocols for High-Speed Networks, volume C-9 of IFIP Transactions, page 185-200. North-Holland, (1992)On-line algorithms for cache sharing., , and . STOC, page 422-430. ACM, (1993)Detecting and correcting malicious data in VANETs., , and . Vehicular Ad Hoc Networks, page 29-37. ACM, (2004)Labelled formal languages and their uses.. Stanford University, USA, (1983)Online Algorithms for Locating Checkpoints, , , and . STOC, page 359-368. ACM, (1990)