Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing intrusion detection in wireless networks using radio frequency fingerprinting., , and . Communications, Internet, and Information Technology, page 201-206. IASTED/ACTA Press, (2004)Local PTAS for Independent Set and Vertex Cover in Location Aware Unit Disk Graphs., and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 415-431. Springer, (2008)Mobile Agent Rendezvous in a Synchronous Torus., , and . LATIN, volume 3887 of Lecture Notes in Computer Science, page 653-664. Springer, (2006)Algorithms for Packing Two Circles in a Convex Polygon., , , and . JCDCG, volume 1763 of Lecture Notes in Computer Science, page 93-103. Springer, (1998)Weighted Distributed Match-Making., and . AWOC, volume 319 of Lecture Notes in Computer Science, page 361-368. Springer, (1988)The Beachcombers' Problem: Walking and Searching with Mobile Robots., , , , and . SIROCCO, volume 8576 of Lecture Notes in Computer Science, page 23-36. Springer, (2014)Mobile Agent Rendezvous: A Survey., , and . SIROCCO, volume 4056 of Lecture Notes in Computer Science, page 1-9. Springer, (2006)Strategies for Hotlink Assignments., , , , , , and . ISAAC, volume 1969 of Lecture Notes in Computer Science, page 23-34. Springer, (2000)When Patrolmen Become Corrupted: Monitoring a Graph Using Faulty Mobile Robots., , , , , and . ISAAC, volume 9472 of Lecture Notes in Computer Science, page 343-354. Springer, (2015)Approximate Hotlink Assignment., , and . ISAAC, volume 2223 of Lecture Notes in Computer Science, page 756-767. Springer, (2001)