Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation Algorithms for Nonuniform Buy-at-Bulk Network Design., , , and . SIAM J. Comput., 39 (5): 1772-1798 (2010)Frugal Auction Design for Set Systems: Vertex Cover and Knapsack., , and . EC, page 645-662. ACM, (2018)Exponential Speedup of Fixed-Parameter Algorithms on K3, 3-Minor-Free or K5-Minor-Free Graphs., , and . ISAAC, volume 2518 of Lecture Notes in Computer Science, page 262-273. Springer, (2002)Erratum to: Editorial., , and . Algorithmica, 73 (4): 750 (2015)PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications., , , , , , and . IEEE Trans. Comput. Soc. Syst., 7 (1): 42-57 (2020)Basic Network Creation Games., , , and . SIAM J. Discret. Math., 27 (2): 656-668 (2013)Hat Guessing Games., , , and . SIAM J. Discret. Math., 22 (2): 592-605 (2008)Multi-VPN Optimization for Scalable Routing via Relaying., , , and . INFOCOM, page 2756-2760. IEEE, (2009)Online client-server load balancing without global information., , , and . SODA, page 197-206. SIAM, (2005)Random MAX SAT, random MAX CUT, and their phase transitions., , , and . SODA, page 364-373. ACM/SIAM, (2003)