Author of the publication

Byzantine Gathering in Networks.

, , and . SIROCCO, volume 9439 of Lecture Notes in Computer Science, page 179-193. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Circle Formation of Weak Robots and Lyndon Words, and . CoRR, (2006)Deterministic Polynomial Approach in the Plane., and . ICALP (2), volume 7966 of Lecture Notes in Computer Science, page 533-544. Springer, (2013)Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports., and . ACM Trans. Algorithms, 11 (2): 10:1-10:29 (2014)Almost-Optimal Deterministic Treasure Hunt in Unweighted Graphs., , , and . ACM Trans. Algorithms, 19 (3): 22:1-22:32 (July 2023)Almost Universal Anonymous Rendezvous in the Plane., , , and . SPAA, page 117-127. ACM, (2020)Impact of Knowledge on Election Time in Anonymous Networks., and . SPAA, page 207-215. ACM, (2017)On the solvability of the localization problem in robot networks., , and . ICRA, page 480-485. IEEE, (2008)Circle Formation of Weak Mobile Robots., , and . SSS, volume 4280 of Lecture Notes in Computer Science, page 262-275. Springer, (2006)Byzantine Gathering in Networks., , and . SIROCCO, volume 9439 of Lecture Notes in Computer Science, page 179-193. Springer, (2015)Deterministic Treasure Hunt in the Plane with Angular Hints., , , and . ISAAC, volume 123 of LIPIcs, page 48:1-48:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)