Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear programming., , and . Handbook of Discrete and Computational Geometry, 2nd Ed., Chapman and Hall/CRC, (2004)On Play by Means of Computing Machines., and . TARK, page 259-274. Morgan Kaufmann, (1986)Efficient Coalition Detection in Traitor Tracing., , and . SEC, volume 278 of IFIP, page 365-380. Springer, (2008)A unified approach to interior point algorithms for linear complementarity problems: A summary., , , and . Oper. Res. Lett., 10 (5): 247-254 (1991)New Algorithms for Generalized Network Flows., and . ISTCS, volume 601 of Lecture Notes in Computer Science, page 103-114. Springer, (1992)A Simplex Algorithm Whose Average Number of Steps is Bounded between Two Quadratic Functions of the Smaller Dimension, and . STOC, page 312-323. ACM, (1984)A Deterministic Poly(log log N)-Time N-Processor Algorithm for Linear Programming in Fixed Dimension, and . STOC, page 327-338. ACM, (1992)Constructing small sample spaces satisfying given constraints., and . STOC, page 268-277. ACM, (1993)Combining expert advice in reactive environments., and . J. ACM, 53 (5): 762-799 (2006)The Weighted Euclidean 1-Center Problem.. Math. Oper. Res., 8 (4): 498-504 (1983)