Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who, When, Where: Timeslot Assignment to Mobile Clients., , , , and . IEEE Trans. Mob. Comput., 11 (1): 73-85 (2012)Selfish Knapsack., and . CoRR, (2015)Knapsack Games and the Truth but not the Whole Truth, , , , and . CoRR, (2011)Modeling and Analysis of Time-Varying Graphs, , , and . CoRR, (2010)Minimum-Cost Broadcast through Varying-Size Neighborcast., , , and . ALGOSENSORS, volume 7111 of Lecture Notes in Computer Science, page 173-187. Springer, (2011)Assigning Sensors to Missions with Demands., , , , , and . ALGOSENSORS, volume 4837 of Lecture Notes in Computer Science, page 114-125. Springer, (2007)Probabilistic Conditionals are Almost Monotonic., and . Rev. Symb. Log., 1 (1): 73-80 (2008)Funding Games: The Truth but Not the Whole Truth., , , , and . WINE, volume 7695 of Lecture Notes in Computer Science, page 128-141. Springer, (2012)A training program to reduce reader search errors for liver metastasis detection in CT., , , , , , , , , and 5 other author(s). Medical Imaging: Image Perception, Observer Performance, and Technology Assessment, volume 12467 of SPIE Proceedings, SPIE, (2023)Peak Shaving through Resource Buffering., , and . WAOA, volume 5426 of Lecture Notes in Computer Science, page 147-159. Springer, (2008)