Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Greedy Facility Location Algorithm Analyzed Using Dual Fitting., , , and . RANDOM-APPROX, volume 2129 of Lecture Notes in Computer Science, page 127-137. Springer, (2001)Dynamics of prisoner's dilemma and the evolution of cooperation on networks., and . ITCS, page 227-235. ACM, (2012)Cutting a Cake for Five People., and . AAIM, volume 5564 of Lecture Notes in Computer Science, page 292-300. Springer, (2009)Prophet Inequalities vs. Approximating Optimum Online., , and . WINE, volume 11316 of Lecture Notes in Computer Science, page 356-374. Springer, (2018)On the core of the multicommodity flow game., and . Decis. Support Syst., 39 (1): 3-10 (2005)Minimizing Effective Resistance of a Graph., , and . SIAM Rev., 50 (1): 37-66 (2008)How Gamification Affects Physical Activity: Large-scale Analysis of Walking Challenges in a Mobile Application., , , and . WWW (Companion Volume), page 455-463. ACM, (2017)On the spread of viruses on the internet, , , and . SODA, page 301-310. SIAM, (2005)On certain connectivity properties of the internet topology., , and . J. Comput. Syst. Sci., 72 (2): 239-251 (2006)Assignment Mechanisms under Distributional Constraints., , and . CoRR, (2018)