Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hans L. BodlaenderProfessor Computer Science, Utrecht UniversityVerified email at uu.nl
Tesshu Hanaka 土中哲秀Kyushu UniversityVerified email at inf.kyushu-u.ac.jp
Sándor Kisfaludi-BakAalto UniversityVerified email at aalto.fi
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Mark de BergProfessor of Computer Science, TU EindhovenVerified email at win.tue.nl
Yota OtachiNagoya UniversityVerified email at nagoya-u.jp
Hirotaka OnoNagoya University, JapanVerified email at i.nagoya-u.ac.jp
Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
Ryuhei UeharaJapan Advanced Institute of Science and TechnologyVerified email at jaist.ac.jp
Han HoogeveenUniversiteit UtrechtVerified email at uu.nl
Eiji MIYANOKyushu Institute of TechnologyVerified email at ai.kyutech.ac.jp
Jesper NederlofUtrecht UniversityVerified email at uu.nl
Marieke van der WegenUniversiteit UtrechtVerified email at uu.nl
Lars JaffkeNHH Norwegian School of Economics, NorwayVerified email at nhh.no
Yusuke KOBAYASHIKyoto UniversityVerified email at kurims.kyoto-u.ac.jp
Yasuaki KobayashiHokkaido UniversityVerified email at ist.hokudai.ac.jp
Clément Legrand-DuchesneUniv. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, F-33400 Talence, FranceVerified email at ens-rennes.fr
Amer MouawadAmerican University of BeirutVerified email at aub.edu.lb
Herbert Hamersprofessor in game theoryVerified email at uvt.nl
Vinicius Fernandes dos SantosDepartamento de Ciência da Computação, Universidade Federal de Minas GeraisVerified email at dcc.ufmg.br