Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memoryless search algorithms in a network with faulty advice., , , and . Theor. Comput. Sci., 402 (2-3): 190-198 (2008)The impact of information on broadcasting time in linear radio networks., , , and . Theor. Comput. Sci., 287 (2): 449-471 (2002)Search and evacuation with a near majority of faulty agents., , , and . ACDA, page 217-227. SIAM, (2021)Minimizing The Maximum Distance Traveled To Form Patterns With Systems of Mobile Robots., , , , , and . CCCG, page 73-79. (2020)Guarding the Convex Subsets of a Point-set., , and . CCCG, (2000)Incremental Construction of k-Dominating Sets in Wireless Sensor Networks., , , and . OPODIS, volume 4305 of Lecture Notes in Computer Science, page 202-214. Springer, (2006)A Novel Underwater Packet Flooding Protocol., , , , and . CCECE, page 438-443. IEEE, (2023)God Save the Queen., , , , , , , and . FUN, volume 100 of LIPIcs, page 16:1-16:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Asymptotics of Canonical RNA Secondary Structures., , and . BIBE, page 184-191. IEEE Computer Society, (2009)On the displacement for covering a unit interval with randomly placed sensors., and . Inf. Process. Lett., 116 (11): 710-717 (2016)