Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tree exploration with logarithmic memory., , , , and . ACM Trans. Algorithms, 7 (2): 17:1-17:21 (2011)Optimal Decision Strategies in Byzantine Environments., and . SIROCCO, volume 3104 of Lecture Notes in Computer Science, page 245-254. Springer, (2004)Approximate Maxima Finding of Continuous Functions Under Restricted Budget (Extended Abstract)., , , and . WG, volume 1197 of Lecture Notes in Computer Science, page 268-278. Springer, (1996)Collecting Information by Power-Aware Mobile Agents., , , , , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 46-60. Springer, (2012)Broadcasting in UDG Radio Networks with Missing and Inaccurate Information., and . DISC, volume 5218 of Lecture Notes in Computer Science, page 257-273. Springer, (2008)Waking Up Anonymous Ad Hoc Radio Networks.. DISC, volume 3724 of Lecture Notes in Computer Science, page 260-272. Springer, (2005)The Impact of Knowledge on Broadcasting Time in Radio Networks., , , and . ESA, volume 1643 of Lecture Notes in Computer Science, page 41-52. Springer, (1999)Deterministic Polynomial Approach in the Plane., and . ICALP (2), volume 7966 of Lecture Notes in Computer Science, page 533-544. Springer, (2013)Deterministic distributed construction of T-dominating sets in time T., and . Discret. Appl. Math., (2017)Prime Decompositions of Regular Prefix Codes, , , and . Implementation and Application of Automata, (2003)