Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evader interdiction: algorithms, complexity and collateral damage., , and . Ann. Oper. Res., 222 (1): 341-359 (2014)You can't get there from here: sensor scheduling with refocusing delays., , , , and . Wirel. Networks, 21 (5): 1683-1698 (2015)Secluded Connectivity Problems., , , and . ESA, volume 8125 of Lecture Notes in Computer Science, page 301-312. Springer, (2013)Efficient multicast in hybrid wireless networks., , , , , and . MILCOM, page 306-311. IEEE, (2015)Brief announcement: pan and scan., and . PODC, page 120-121. ACM, (2010)Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage., , and . SSS, volume 6366 of Lecture Notes in Computer Science, page 282-284. Springer, (2010)Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks., , , and . DCOSS, volume 5516 of Lecture Notes in Computer Science, page 87-102. Springer, (2009)When to Reap and When to Sow - Lowering Peak Usage with Realistic Batteries., , , and . WEA, volume 5038 of Lecture Notes in Computer Science, page 194-207. Springer, (2008)Worst-Case Instances and Lower Bounds via Genetic Algorithms., and . SEAL, volume 2 of Advances in Natural Computation, page 662-681. World Scientific, (2002)Low Expected Latency Routing in Dynamic Networks., , , and . MASS, page 267-271. IEEE Computer Society, (2014)