Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Techniques for scheduling with rejection., , , , , and . J. Algorithms, 49 (1): 175-191 (2003)Task planning with transportation constraints: approximation bounds, implementation and experiments., , and . ICRA, page 3542-3547. IEEE, (2003)Energy-efficient routing through Weighted Load Balancing., and . GLOBECOM, page 31-37. IEEE, (2012)Minimum Latency Multiple Data MULETrajectory Planning in Wireless Sensor Networks., , , , , and . IEEE Trans. Mob. Comput., 13 (4): 838-851 (2014)On the complexity and hardness of the steganography embedding problem., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 496-500. SPIE, (2004)Harnessing spectrum awareness to enhance mobile computing: poster., , and . MobiCom, page 460-461. ACM, (2016)A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment., , , , , and . IEEE Trans. Veh. Technol., 66 (5): 4200-4211 (2017)On the Use of Genetic Algorithms in Database Client Clustering., , , and . ICTAI, page 339-342. IEEE Computer Society, (1999)Off-line admission control for general scheduling problems., , and . SODA, page 879-888. ACM/SIAM, (2000)An Experimental Study of LP-Based Approximation Algorithms for Scheduling Problems., , and . SODA, page 453-462. ACM/SIAM, (1998)