Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Sampling Techniques and Applications., and . COMAD, page 11. Allied Publishers, (2010)Online and offline algorithms for the sorting buffers problem on the line metric., and . J. Discrete Algorithms, 8 (1): 24-35 (2010)Offline Sorting Buffers on Line., and . ISAAC, volume 4288 of Lecture Notes in Computer Science, page 81-89. Springer, (2006)Algorithmic Aspects of Planning under Uncertainty for Service Delivery Organizations., , and . ICSOC, volume 7636 of Lecture Notes in Computer Science, page 615-622. Springer, (2012)Ranking Mechanisms for Interaction Networks., , and . COMAD, page 15-17. Allied Publishers, (2011)Analysis of sampling techniques for association rule mining., , and . ICDT, volume 361 of ACM International Conference Proceeding Series, page 276-283. ACM, (2009)Improved approximation for universal facility location., , and . SODA, page 959-960. SIAM, (2005)Order Scheduling Models: Hardness and Algorithms., , and . FSTTCS, volume 4855 of Lecture Notes in Computer Science, page 96-107. Springer, (2007)Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory., , , , and . IEEE ICBC, page 385-393. IEEE, (2019)Verifiable Observation of Permissioned Ledgers., , , , , , and . CoRR, (2020)