Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear-time nearest point algorithms for coxeter lattices., , and . IEEE Trans. Inf. Theory, 56 (3): 1015-1022 (2010)Shallow Excluded Minors and Improved Graph Decompositions., , and . SODA, page 462-470. ACM/SIAM, (1994)1. AES seems weak. 2. Linear time secure cryptography.. IACR Cryptology ePrint Archive, (2007)Approximating Geometrical Graphs via "Spanners" and "Banyans"., and . STOC, page 540-550. ACM, (1998)Three counterexamples refuting Kieu's plan for "quantum adiabatic hypercomputation"; and some uncomputable quantum mechanical tasks.. Appl. Math. Comput., 178 (1): 184-193 (2006)Nonabelian sets with distinct k-sums., and . Discret. Math., 146 (1-3): 169-177 (1995)A Linear-Time Algorithm for Testing the Inscribability of Trivalent Polyhedra., and . SCG, page 177-185. ACM, (1992)DNA computers in vitro and vivo.. DNA Based Computers, volume 27 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 121-185. DIMACS/AMS, (1995)Geometric Separator Theorems & Applications., and . FOCS, page 232-243. IEEE Computer Society, (1998)A Simple Method for Resolving Degeneracies in Delaunay Triangulations., and . ICALP, volume 700 of Lecture Notes in Computer Science, page 177-188. Springer, (1993)