Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Network Structure on the Stability of Greedy Protocols., , , and . Theory Comput. Syst., 38 (4): 425-460 (2005)Attack Propagation in Networks., , , and . Theory Comput. Syst., 36 (5): 553-574 (2003)On the Random Generation and Counting of Matchings in Dense Graphs., , and . Theor. Comput. Sci., 201 (1-2): 281-290 (1998)Attack Modelling in Open Network Environments., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 268-277. Chapman & Hall, (1996)Advances in Rate-Based Flow Control., , and . SIROCCO, page 266-281. Carleton Scientific, (1997)Approximate Equilibria and Ball Fusion., , and . SIROCCO, volume 13 of Proceedings in Informatics, page 223-235. Carleton Scientific, (2002)The Cost of Concurrent, Low-Contention Read-Modify-Write., , and . SIROCCO, volume 17 of Proceedings in Informatics, page 57-72. Carleton Scientific, (2003)Instability of Networks with Quasi-Static Link Capacities., , and . SIROCCO, volume 17 of Proceedings in Informatics, page 179-194. Carleton Scientific, (2003)Implementation and Testing Eavesdropper Protocols Using the DSP Tool., , , and . Algorithm Engineering, page 74-85. Max-Planck-Institut für Informatik, (1998)Recent Advances in Approximability of Bimatrix Nash., , and . Bulletin of the EATCS, (2009)