Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Risk-Averse Weighted k-Club Problems., , , and . Examining Robustness and Vulnerability of Networked Systems, volume 37 of NATO Science for Peace and Security Series, D: Information and Communication Security, IOS Press, (2014)Optimal design and augmentation of strongly attack-tolerant two-hop clusters in directed networks., , , and . J. Comb. Optim., 27 (3): 462-486 (2014)Remarks on the attainable distributions of controlled-diffusion processes of distributed systems., and . ACC, page 6574-6579. IEEE, (2016)Sampled Fictitious Play on Networks., , and . CSoNet, volume 11917 of Lecture Notes in Computer Science, page 33-44. Springer, (2019)Critical arcs detection in influence networks., , , and . Networks, 71 (4): 412-431 (2018)Cascade of Edge Activation in Networks., , and . CSoNet, volume 11917 of Lecture Notes in Computer Science, page 141-147. Springer, (2019)Adaptive Video Encoding and Dynamic Channel Access for Real-time Streaming over SDRs., , , and . IPCCC, page 1-9. IEEE, (2018)Graph-Based Supervised Clustering in Vector Space., , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 476-486. Springer, (2020)Dynamic risk measures and related risk-averse decision problems., , and . ACC, page 3494-3499. IEEE, (2017)Continuous congestion control for Differentiated-Services networks?, , , , and . CDC, page 4591-4596. IEEE, (2012)