Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tree exploration with logarithmic memory., , , , and . ACM Trans. Algorithms, 7 (2): 17:1-17:21 (2011)The Impact of Knowledge on Broadcasting Time in Radio Networks., , , and . ESA, volume 1643 of Lecture Notes in Computer Science, page 41-52. Springer, (1999)Deterministic Polynomial Approach in the Plane., and . ICALP (2), volume 7966 of Lecture Notes in Computer Science, page 533-544. Springer, (2013)Deterministic gathering with crash faults.. Networks, 72 (2): 182-199 (2018)Using Time to Break Symmetry: Universal Deterministic Anonymous Rendezvous., and . CoRR, (2018)Better Adaptive Diagnosis of Hypercubes., and . IEEE Trans. Computers, 49 (10): 1013-1020 (2000)Exploring Unknown Undirected Graphs., and . SODA, page 316-322. ACM/SIAM, (1998)Deterministic rendezvous with detection using beeps., and . CoRR, (2017)How to meet asynchronously (almost) everywhere., , and . ACM Trans. Algorithms, 8 (4): 37:1-37:14 (2012)Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports., and . ACM Trans. Algorithms, 11 (2): 10:1-10:29 (2014)