Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to detect a counterfeit coin: Adaptive versus non-adaptive solutions., , and . Inf. Process. Lett., 86 (3): 137-141 (2003)Planar Graph Coloring with Forbidden Subgraphs: Why Trees and Paths Are Dangerous., , , and . SWAT, volume 2368 of Lecture Notes in Computer Science, page 160-169. Springer, (2002)The Steiner Tree Problem in Kalmanson Matrices and in Circulant Matrices., and . J. Comb. Optim., 3 (1): 51-58 (1999)The Stock Size Problem., , , and . Operations Research, 46 (3-Supplement-3): S1-S12 (1998)When Does a Dynamic Programming Formulation Guarantee the Existence of an FPTAS?. SODA, page 820-829. ACM/SIAM, (1999)An Algorithmic Analysis of the Honey-Bee Game., and . FUN, volume 6099 of Lecture Notes in Computer Science, page 178-189. Springer, (2010)Dynamic and Kinetic Conflict-Free Coloring of Intervals with Respect to Points., , , , , and . CoRR, (2017)The multi-stripe travelling salesman problem., , and . CoRR, (2016)Analysis of multi-stage open shop processing systems., , and . STACS, volume 9 of LIPIcs, page 484-494. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2011)An axiomatic characterization of the Hirsch-index.. Math. Soc. Sci., 56 (2): 224-232 (2008)