Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Doubly Logarithmic Communication Algorithm for the Completely Connected Optical Communication Parallel Computer., , , and . SPAA, page 300-309. ACM, (1993)New Graph Decompositions and Fast Emulations in Hypercubes and Butterflies., , and . SPAA, page 325-334. ACM, (1993)An Optical Simulation of Shared Memory., , and . SPAA, page 257-267. ACM, (1994)Simple Path Selection for Optimal Routing on Processor Arrays., , and . SPAA, page 23-30. ACM, (1992)Graph partitioning using single commodity flows., , and . STOC, page 385-390. ACM, (2006)Approximating Geometrical Graphs via "Spanners" and "Banyans"., and . STOC, page 540-550. ACM, (1998)Eigenvalue bounds, spectral partitioning, and metrical deformations via flows., , and . J. ACM, 57 (3): 13:1-13:23 (2010)Distributed algorithms for multicommodity flow problems via approximate steepest descent framework., , and . ACM Trans. Algorithms, 9 (1): 3:1-3:14 (2012)Maximal Accurate Forests from Distance Matrices., , , , , and . RECOMB, volume 3909 of Lecture Notes in Computer Science, page 281-295. Springer, (2006)Stealthy poisoning attacks on PCA-based anomaly detectors., , , , , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 73-74 (2009)