Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Search and evacuation with a near majority of faulty agents., , , and . ACDA, page 217-227. SIAM, (2021)Guarding the Convex Subsets of a Point-set., , and . CCCG, (2000)Communication Problems for Mobile Agents Exchanging Energy., , , and . SIROCCO, volume 9988 of Lecture Notes in Computer Science, page 275-288. (2016)God Save the Queen., , , , , , , and . FUN, volume 100 of LIPIcs, page 16:1-16:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Consensus and Mutual Exclusion in a Multiple Access Channel., , , and . IEEE Trans. Parallel Distributed Syst., 22 (7): 1092-1104 (2011)Separating Translates in the Plane: Combinatorial Bounds and an Algorithm., , and . Int. J. Comput. Geom. Appl., 7 (6): 551-562 (1997)Optimal patrolling of fragmented boundaries., , , , , , , and . SPAA, page 241-250. ACM, (2013)The Aquarium Keeper's Problem., , , , , , , and . SODA, page 459-464. ACM/SIAM, (1991)Patrolling Trees with Mobile Robots., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 331-344. Springer, (2016)Prime Decompositions of Regular Prefix Codes., , , and . CIAA, volume 2608 of Lecture Notes in Computer Science, page 85-94. Springer, (2002)