Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repeated edges in 2-factorizations., and . J. Graph Theory, 14 (1): 5-24 (1990)Detecting Arrays for Main Effects., and . CAI, volume 11545 of Lecture Notes in Computer Science, page 112-123. Springer, (2019)Finding Interaction Faults Adaptively Using Distance-Based Strategies., , and . ECBS, page 4-13. IEEE Computer Society, (2011)Cluttered Orderings for the Complete Graph., , and . COCOON, volume 2108 of Lecture Notes in Computer Science, page 420-431. Springer, (2001)Cataloguing the graphs on 10 vertices., , , and . J. Graph Theory, 9 (4): 551-562 (1985)Test-Algebra-Based Fault Location Analysis for the Concurrent Combinatorial Testing., , , , and . IEEE Trans. Reliab., 67 (3): 802-831 (2018)Randomized post-optimization of covering arrays., , and . Eur. J. Comb., 34 (1): 91-103 (2013)Failed disk recovery in double erasure RAID arrays., and . J. Discrete Algorithms, 5 (1): 115-128 (2007)The fine structure of threefold triple systems: u = 1 or 3 (mod 6)., , , and . Discret. Math., 92 (1-3): 49-64 (1991)Boolean Aspects of Network Reliability., , and . Boolean Models and Methods, Cambridge University Press, (2010)