Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Hans L. BodlaenderProfessor Computer Science, Utrecht UniversityVerified email at uu.nl
- Tesshu Hanaka 土中哲秀Kyushu UniversityVerified email at inf.kyushu-u.ac.jp
- Sándor Kisfaludi-BakAalto UniversityVerified email at aalto.fi
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Mark de BergProfessor of Computer Science, TU EindhovenVerified email at win.tue.nl
- Yota OtachiNagoya UniversityVerified email at nagoya-u.jp
- Hirotaka OnoNagoya University, JapanVerified email at i.nagoya-u.ac.jp
- Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
- Ryuhei UeharaJapan Advanced Institute of Science and TechnologyVerified email at jaist.ac.jp
- Han HoogeveenUniversiteit UtrechtVerified email at uu.nl
- Eiji MIYANOKyushu Institute of TechnologyVerified email at ai.kyutech.ac.jp
- Jesper NederlofUtrecht UniversityVerified email at uu.nl
- Marieke van der WegenUniversiteit UtrechtVerified email at uu.nl
- Lars JaffkeNHH Norwegian School of Economics, NorwayVerified email at nhh.no
- Yusuke KOBAYASHIKyoto UniversityVerified email at kurims.kyoto-u.ac.jp
- Yasuaki KobayashiHokkaido UniversityVerified email at ist.hokudai.ac.jp
- Clément Legrand-DuchesneUniv. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, F-33400 Talence, FranceVerified email at ens-rennes.fr
- Amer MouawadAmerican University of BeirutVerified email at aub.edu.lb
- Herbert Hamersprofessor in game theoryVerified email at uvt.nl
- Vinicius Fernandes dos SantosDepartamento de Ciência da Computação, Universidade Federal de Minas GeraisVerified email at dcc.ufmg.br