Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight Bounds for Oblivious Routing in the Hypercube., , and . SPAA, page 31-36. ACM, (1990)Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)Randomized rendezvous with limited memory., , and . ACM Trans. Algorithms, 7 (3): 34:1-34:12 (2011)Book review: Gems of Theoretical Computer Science by Uwe Schöning and Randall Pruim (Springer-Verlag, 1998).. SIGACT News, 31 (2): 2-5 (2000)On Recognizing a String on an Anonymous Ring., , and . Theory Comput. Syst., 34 (1): 3-12 (2001)On Multi-Label Linear Interval Routing Schemes (Extended Abstract)., , and . WG, volume 790 of Lecture Notes in Computer Science, page 338-349. Springer, (1993)A Time-Randomness Tradeoff for Selection in Parallel.. WADS, volume 709 of Lecture Notes in Computer Science, page 464-470. Springer, (1993)String Recognition on Anonymous Rings., , and . MFCS, volume 969 of Lecture Notes in Computer Science, page 392-401. Springer, (1995)Randomized Rendez-Vous with Limited Memory., , and . LATIN, volume 4957 of Lecture Notes in Computer Science, page 605-616. Springer, (2008)