Get my own profile
Public access
View all33 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Weidong ShiUniversity of HoustonVerified email at uh.edu
Lei XuComputer Science Department, Kent State UniversityVerified email at kent.edu
Zhimin GaoAuburn University at MontgomeryVerified email at aum.edu
Guochuan ZhangZhejiang UniversityVerified email at zju.edu.cn
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Nicole MegowProfessor of Mathematics and Computer Science, University of BremenVerified email at uni-bremen.de
Klaus JansenProfessor, Computer Science, University of KielVerified email at informatik.uni-kiel.de
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kevin SchewiorUniversity of Southern Denmark, Department of Mathematics and Computer ScienceVerified email at sdu.dk
Leen StougieSenior Researcher CWI, Prof. of Operations Research Vrije Universiteit, AmsterdamVerified email at cwi.nl
José VerschaeAssociate Professor, Pontificia Universidad Católica de ChileVerified email at uc.cl
Martin GroßRWTH AachenVerified email at oms.rwth-aachen.de
Yann DisserProfessor for Combinatorial Optimization, Department of Mathematics, TU DarmstadtVerified email at mathematik.tu-darmstadt.de