Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight bounds for k-set agreement with limited-scope failure detectors., and . Distributed Comput., 18 (2): 157-166 (2005)Geodetic Convexity Parameters for Graphs with Few Short Induced Paths., , and . WG, volume 9941 of Lecture Notes in Computer Science, page 25-37. (2016)The South Zone: Distributed Algorithms for Alliances., , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 178-192. Springer, (2011)On Graphs with Induced Matching Number Almost Equal to Matching Number., , , , and . Electron. Notes Discret. Math., (2015)More fires and more fighters., , , , and . Discret. Appl. Math., 161 (16-17): 2410-2419 (2013)A distributed algorithm to find k-dominating sets., and . Discret. Appl. Math., 141 (1-3): 243-253 (2004)Irreversible conversion of graphs., , , , and . Theor. Comput. Sci., 412 (29): 3693-3700 (2011)Secure Failure Detection and Consensus in TrustedPals., , , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 610-625 (2012)Transformations in Secure and Fault-Tolerant Distributed Computation., , and . GI Jahrestagung (1), volume P-67 of LNI, page 410-412. GI, (2005)The Hull Number in the Convexity of Induced Paths of Order 3., , and . IWOCA, volume 11638 of Lecture Notes in Computer Science, page 214-228. Springer, (2019)