Get my own profile
Public access
View all37 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Weidong ShiUniversity of HoustonVerified email at uh.edu
Lei XuComputer Science Department, Kent State UniversityVerified email at kent.edu
Zhimin GaoAuburn University at MontgomeryVerified email at aum.edu
Guochuan ZhangZhejiang UniversityVerified email at zju.edu.cn
Nicole MegowProfessor of Mathematics and Computer Science, University of BremenVerified email at uni-bremen.de
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Klaus JansenProfessor, Computer Science, University of KielVerified email at informatik.uni-kiel.de
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
José VerschaeAssociate Professor, Pontificia Universidad Católica de ChileVerified email at uc.cl
Kevin SchewiorUniversity of Cologne; University of Southern Denmark (on leave)Verified email at sdu.dk
Leen StougieSenior Researcher CWI, Prof. of Operations Research Vrije Universiteit, AmsterdamVerified email at cwi.nl
Martin GroßRWTH AachenVerified email at oms.rwth-aachen.de
Yann DisserProfessor for Combinatorial Optimization, Department of Mathematics, TU DarmstadtVerified email at mathematik.tu-darmstadt.de