Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Coteries and Voting Schemes., , , , and . Inf. Process. Lett., 51 (1): 1-6 (1994)Tight Bounds for Oblivious Routing in the Hypercube., , and . SPAA, page 31-36. ACM, (1990)On Recognizing a String on an Anonymous Ring., , and . Theory Comput. Syst., 34 (1): 3-12 (2001)On Multi-Label Linear Interval Routing Schemes (Extended Abstract)., , and . WG, volume 790 of Lecture Notes in Computer Science, page 338-349. Springer, (1993)Effectiveness and detection of denial-of-service attacks in tor., , , and . ACM Trans. Inf. Syst. Secur., 15 (3): 11:1-11:25 (2012)Book review: Gems of Theoretical Computer Science by Uwe Schöning and Randall Pruim (Springer-Verlag, 1998).. SIGACT News, 31 (2): 2-5 (2000)Randomized rendezvous with limited memory., , and . ACM Trans. Algorithms, 7 (3): 34:1-34:12 (2011)Computing Boolean Functions on Anonymous Networks., , and . ICALP, volume 443 of Lecture Notes in Computer Science, page 254-267. Springer, (1990)Fault-Tolerant Broadcasting in Radio Networks (Extended Abstract)., , and . ESA, volume 1461 of Lecture Notes in Computer Science, page 283-294. Springer, (1998)Excuse Me! or The Courteous Theatregoers' Problem - (Extended Abstract)., , and . FUN, volume 8496 of Lecture Notes in Computer Science, page 194-205. Springer, (2014)