Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing the Convex Hull of Line Intersections.. J. Algorithms, 7 (2): 285-288 (1986)An Adversary-Based Lower Bound for Sorting., and . Inf. Process. Lett., 13 (2): 55-57 (1981)A tree-covering problem arising in integrity of tree-structured data., , and . Inf. Process. Lett., 109 (1): 79-82 (2008)Sequence comparison on the connection machine., and . Concurrency - Practice and Experience, 3 (2): 89-107 (1991)Finding a minimum independent dominating set in a permutation graph., , and . Discrete Applied Mathematics, 21 (3): 177-183 (1988)Passwords for Everyone: Secure Mnemonic-based Accessible Authentication., , and . USENIX Annual Technical Conference, page 369-374. USENIX, (2007)Protocols for Secure Remote Database Access with Approximate Matching., and . E-Commerce Security and Privacy, volume 2 of Advances in Information Security, Springer, (2001)On-the-fly Intrusion Detection for Web Portals., , and . ITCC, page 325-330. IEEE Computer Society, (2003)A Randomized Algorithm for Approximate String Matching., , and . Algorithmica, 29 (3): 468-486 (2001)Rights Protection for Categorical Data., , and . IEEE Trans. Knowl. Data Eng., 17 (7): 912-926 (2005)