Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Remote Sensing Method to Estimate River to Ocean DOC Flux in Peatland Dominated Sarawak Coastal Regions, Borneo., , , , , , , , and . Remote. Sens., 12 (20): 3380 (2020)On the Consistency of Circuit Lower Bounds for Non-deterministic Time., , and . STOC, page 1257-1270. ACM, (2023)Lower Bounds for DNF-refutations of a Relativized Weak Pigeonhole Principle., , and . CCC, page 109-120. IEEE Computer Society, (2013)An Algebraic Preservation Theorem for Aleph-Zero Categorical Quantified Constraint Satisfaction., and . LICS, page 215-224. IEEE Computer Society, (2012)Fragmentation, Truncation, and Timeouts: Are Large DNS Messages Falling to Bits?, , , , and . PAM, volume 12671 of Lecture Notes in Computer Science, page 460-477. Springer, (2021)The Fine Classification of Conjunctive Queries and Parameterized Logarithmic Space., and . TOCT, 7 (2): 7:1-7:27 (2015)Partially definable forcing and bounded arithmetic., and . Arch. Math. Log., 54 (1-2): 1-33 (2015)Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event., , , , , , and . Internet Measurement Conference, page 255-270. ACM, (2016)Parameterized Derandomization.. IWPEC, volume 5018 of Lecture Notes in Computer Science, page 148-159. Springer, (2008)One hierarchy spawns another: graph deconstructions and the complexity classification of conjunctive queries., and . CSL-LICS, page 32:1-32:10. ACM, (2014)