Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing the Guarded Boundary of an Art Gallery Is APX-Complete., , and . CIAC, volume 2653 of Lecture Notes in Computer Science, page 24-35. Springer, (2003)Mobile Agents Rendezvous in Spite of a Malicious Agent., , and . ALGOSENSORS, volume 9536 of Lecture Notes in Computer Science, page 211-224. Springer, (2015)Searching for a Black Hole in Synchronous Tree Networks., , , and . Comb. Probab. Comput., 16 (4): 595-619 (2007)Online Graph Exploration with Advice., , and . SIROCCO, volume 7355 of Lecture Notes in Computer Science, page 267-278. Springer, (2012)Distributed Routing in Tree Networks with Few Landmarks., , and . CAAN, volume 4235 of Lecture Notes in Computer Science, page 45-57. Springer, (2006)Maximizing the guarded boundary of an Art Gallery is APX-complete., , and . Comput. Geom., 38 (3): 170-180 (2007)Gathering of robots in a ring with mobile faults., , , , and . Theor. Comput. Sci., (2019)Dangerous Graphs., and . Distributed Computing by Mobile Entities, volume 11340 of Lecture Notes in Computer Science, Springer, (2019)Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings, , , and . CoRR, (2011)Complexity of Searching for a Black Hole., , , and . Fundam. Informaticae, 71 (2-3): 229-242 (2006)