Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Machine Control to Material Programming: Self-Shaping Wood Manufacturing of a High Performance Curved CLT Structure -- Urbach Tower, , , , , , , , , and . Fabricate 2020: Making Resilient Architecture, (2020)From Machine Control to Material Programming Self-Shaping Wood Manufacturing of a High Performance Curved CLT Structure - Urbach Tower, , , , , , , , , and . Making Resilent Architecture - FABRICATE 2020, (2020)From Machine Control to Material Programming Self-Shaping Wood Manufacturing of a High Performance Curved CLT Structure - Urbach Tower, , , , , , , , , and . 4, (April 2020)Max-tolerance graphs as intersection graphs: cliques, cycles, and recognition., , , and . SODA, page 832-841. ACM Press, (2006)Advanced Centrality Concepts., , , and . Network Analysis, volume 3418 of Lecture Notes in Computer Science, page 83-111. Springer, (2004)Visualizing Large and Clustered Networks., and . Graph Drawing, volume 4372 of Lecture Notes in Computer Science, page 240-251. Springer, (2006)T-DHT: Topology-based Distributed Hash Tables., , and . Peer-to-Peer Computing, page 143-144. IEEE Computer Society, (2005)Evolutionary algorithms for the self-organized evolution of networks., and . GECCO, page 563-570. ACM, (2005)A New Approach for Boundary Recognition in Geometric Sensor Networks, , , and . CoRR, (2005)Algorithms for Centrality Indices., , , , and . Network Analysis, volume 3418 of Lecture Notes in Computer Science, page 62-82. Springer, (2004)