Get my own profile
Public access
View all34 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Weidong ShiUniversity of HoustonVerified email at uh.edu
- Lei XuComputer Science Department, Kent State UniversityVerified email at kent.edu
- Zhimin GaoAuburn University at MontgomeryVerified email at aum.edu
- Guochuan ZhangZhejiang UniversityVerified email at zju.edu.cn
- Nicole MegowProfessor of Mathematics and Computer Science, University of BremenVerified email at uni-bremen.de
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Klaus JansenProfessor, Computer Science, University of KielVerified email at informatik.uni-kiel.de
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- José VerschaeAssociate Professor, Pontificia Universidad Católica de ChileVerified email at uc.cl
- Kevin SchewiorUniversity of Southern Denmark, Department of Mathematics and Computer ScienceVerified email at sdu.dk
- Leen StougieSenior Researcher CWI, Prof. of Operations Research Vrije Universiteit, AmsterdamVerified email at cwi.nl
- Martin GroßRWTH AachenVerified email at oms.rwth-aachen.de
- Yann DisserProfessor for Combinatorial Optimization, Department of Mathematics, TU DarmstadtVerified email at mathematik.tu-darmstadt.de