Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confidential gossip., , and . Distributed Comput., 33 (5): 367-392 (2020)Ordered and delayed adversaries and how to work against them on a shared channel., , and . Distributed Comput., 32 (5): 379-403 (2019)On the complexity of distributed BFS in ad hoc networks with spontaneous wake-up., and . Discret. Math. Theor. Comput. Sci., 15 (3): 101-118 (2013)Online packet scheduling under adversarial errors., , , and . Theor. Comput. Sci., (2019)Emulating shared-memory Do-All algorithms in asynchronous message-passing systems., , and . J. Parallel Distributed Comput., 70 (6): 699-705 (2010)Node discovery in networks., , and . J. Parallel Distributed Comput., 69 (4): 337-348 (2009)Dynamic Multiple-Message Broadcast: Bounding Throughput in the Affectance Model., , and . Theory Comput. Syst., 67 (4): 825-854 (August 2023)Maximum throughput of multiple access channels in adversarial environments., , and . Distributed Comput., 22 (2): 93-116 (2009)Ad-hoc Affectance-selective Families for Layer Dissemination in IoT Subnets: Poster Abstract., , and . IoTDI, page 313-314. ACM, (2017)Connectivity Problem in Wireless Networks., and . DISC, volume 6343 of Lecture Notes in Computer Science, page 344-358. Springer, (2010)