Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The (not so) Critical Nodes of Criminal Networks., , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 87-96. Springer, (2014)Dominating Sets and Connected Dominating Sets in Dynamic Graphs., , , and . STACS, volume 126 of LIPIcs, page 35:1-35:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Restoration Algorithms for Virtual Private Networks in the Hose Model., , and . INFOCOM, page 131-139. IEEE Computer Society, (2002)Concurrent Algorithms and Data Types Animation over the Internet., , , and . IFIP Congress: Fundamentals - Foundations of Computer Science, volume 117 of books@ocg.at, page 63-80. Austrian Computer Society, (1998)Visualization Techniques for Algorithm Engineering., and . Encyclopedia of Algorithms, (2016)2D Color Barcodes for Mobile Phones., , , and . IJCSA, 8 (1): 136-155 (2011)The value of location in keyword auctions., , and . Electron. Commer. Res. Appl., 9 (2): 160-170 (2010)Extracting social networks from seized smartphones and web data., , , and . WIFS, page 101-105. IEEE, (2009)The Competitor Busting Strategy in Keyword Auctions: Who's Worst Hit?, , , , and . CNSR, page 153-160. IEEE Computer Society, (2011)Finding Strong Bridges and Strong Articulation Points in Linear Time., , and . COCOA (1), volume 6508 of Lecture Notes in Computer Science, page 157-169. Springer, (2010)