Author of the publication

Max-Sum for Allocation of Changing Cost Tasks.

, , and . IAS, volume 531 of Advances in Intelligent Systems and Computing, page 629-642. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Spatial Locality and Heterogeneity of Agents for Search and Rescue Teamwork., , , and . J. Field Robotics, 33 (7): 877-900 (2016)Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It., , , , , and . USENIX Security Symposium, page 109-126. USENIX Association, (2020)Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities., , , , and . USENIX Security Symposium, page 6525-6540. USENIX Association, (2023)Balboa: Bobbing and Weaving around Network Censorship., , and . USENIX Security Symposium, page 3399-3413. USENIX Association, (2021)On intrusion detection and response for mobile ad hoc networks., , , and . IPCCC, page 747-752. IEEE, (2004)A 60GHz CMOS phased-array transceiver pair for multi-Gb/s wireless communications., , , , , , , , , and 2 other author(s). ISSCC, page 164-166. IEEE, (2011)Tasks with cost growing over time and agent reallocation delays., and . AAMAS, page 381-388. IFAAMAS/ACM, (2014)Verifying replicated data types with typeclass refinements in Liquid Haskell., , , , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 216:1-216:30 (2020)Advanced Language-based Techniques for Correct, Secure Networked Systems.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26387).Distributed Multi-Level Recovery in Main-Memory Databases., , , , , and . PDIS, page 44-55. IEEE Computer Society, (1996)