Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Context-Aware Approach to Infer Trust in Public Key Infrastructures., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 111-125. Kluwer, (2002)On Colorful Bin Packing Games., , , and . CoRR, (2017)Experimental Evaluations of Algorithms for IP Table Minimization., , , , and . J. Interconnect. Networks, 12 (4): 299-318 (2011)Sharing the cost of multicast transmissions in wireless networks., , , , and . Theor. Comput. Sci., 369 (1-3): 269-284 (2006)Timestamping Algorithms: A Characterization and a Few Properties., , , and . Euro-Par, volume 1900 of Lecture Notes in Computer Science, page 609-616. Springer, (2000)Multicast Transmissions in Non-cooperative Networks with a Limited Number of Selfish Moves., , , and . MFCS, volume 4162 of Lecture Notes in Computer Science, page 363-374. Springer, (2006)A Reference Architecture for the Certification of E-Services in a Digital Government Infrastructure., , , and . Distributed Parallel Databases, 12 (2/3): 217-234 (2002)On Nash equilibria for multicast transmissions in ad-hoc wireless networks., , , and . Wirel. Networks, 14 (2): 147-157 (2008)Learning Iteration for Grades 2-3: Puzzles vs. UMC in Code.org., , , , , , , , , and 5 other author(s). SIGCSE (2), page 1368. ACM, (2023)On Pareto optimality in social distance games., , , and . Artif. Intell., (2022)