Author of the publication

Straightening Drawings of Clustered Hierarchical Graphs

, , , and . Proc. 33rd Int. Conf. Current Trends Theory & Practice Comput. Sci. (SOFSEM'07), volume 4362 of Lecture Notes in Computer Science, page 177--186. Springer-Verlag, (2007)
DOI: 10.1007/978-3-540-69507-3_14

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phylogenetic Networks Based on the Molecular Clock Hypothesis., and . IEEE ACM Trans. Comput. Biol. Bioinform., 4 (4): 661-667 (2007)Robust Point-Location in Generalized Voronoi Diagrams., , and . Generalized Voronoi Diagram, volume 158 of Studies in Computational Intelligence, Springer, (2008)Virtual reality with the integrated automatic presentation scrip for improving concepts understanding of Urban Design - a case study in Tatsumi region of Tokyo Bay zone, Japan., , and . Multim. Tools Appl., 79 (5-6): 3125-3144 (2020)Research on Embedded-Based Wireless Authentication System., , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 469-475. Springer, (2012)Phylogenetic Networks Based on the Molecular Clock Hypothesis., and . BIBE, page 320-323. IEEE Computer Society, (2005)Robust Point-Location in Generalized Voronoi Diagrams., , and . ISVD, page 54-59. IEEE Computer Society, (2006)LazyBarrier: Reconstructing Android IO Stack for Barrier-Enabled Flash Storage., , , , , , and . ASPLOS (2), page 601-615. ACM, (2024)Extracting Rectified Building Footprints from Traditional Orthophotos: A New Workflow., , , and . Sensors, 22 (1): 207 (2022)An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts., , , and . Future Internet, 15 (11): 361 (2023)