Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Parallel Algorithms for Chordal Graphs., and . ICCI, volume 497 of Lecture Notes in Computer Science, page 372-382. Springer, (1991)Preface., , and . Discret. Math., 306 (3): 293 (2006)What is Information Technology's Role in Cybersecurity?, , , and . SIGITE, page 46-47. ACM, (2016)Designing an interdisciplinary information technology program., , , , , and . SIGITE Conference, page 71-76. ACM, (2006)On Finding Minimum-Diameter Clique Trees., and . Nord. J. Comput., 1 (2): 173-201 (1994)Evaluating the fidelity of a partitioned digital image halftoning algorithm., , , , and . Visual Information Processing, volume 4388 of SPIE Proceedings, page 13-23. SPIE, (2001)On the Maximum Number of Edges in Chordal Graphs of Bounded Degree and Matching Number., , , and . LATIN, volume 12118 of Lecture Notes in Computer Science, page 600-612. Springer, (2020)Puzzles and games: addressing different learning styles in teaching operating systems concepts., , , and . SIGCSE, page 182-186. ACM, (2003)Graph Extremities Defined by Search Algorithms., , , and . Algorithms, 3 (2): 100-124 (2010)The Impact of wire Topology on Single Row Routing., and . Journal of Circuits, Systems, and Computers, 2 (2): 101-112 (1992)