Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounds on threshold dimension and disjoint threshold coverings (abstract only)., , and . ACM Conference on Computer Science, page 422. ACM, (1985)Mimimal threshold separators and memory requirements for synchronization (abstract only).. ACM Conference on Computer Science, page 430. ACM, (1985)Generalized Mutual Exclusion with Semaphores Only., , and . Fundam. Inform., 40 (4): 407-422 (1999)Clique partitions and clique coverings., , and . Discrete Mathematics, 72 (1-3): 93-101 (1988)Minimal Threshold Separators and Memory Requirements for Synchronization.. SIAM J. Comput., 18 (1): 152-165 (1989)No Three Faces with the Same Number of Edges: 10856., , and . The American Mathematical Monthly, 113 (2): 180-183 (2006)Clique Partitions of Chordal Graphs., , and . Combinatorics, Probability & Computing, (1993)The size of chordal, interval and threshold subgraphs., , , and . Combinatorica, 9 (3): 245-253 (1989)Byzantine Firing Squad Using a Faulty External Source.. WDAG, volume 312 of Lecture Notes in Computer Science, page 76-83. Springer, (1987)Limitations of Using Tokens for Mutual Exclusion.. ACM Conference on Computer Science, page 26-29. ACM, (1995)