Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal design and augmentation of strongly attack-tolerant two-hop clusters in directed networks., , , and . J. Comb. Optim., 27 (3): 462-486 (2014)Minimum vertex blocker clique problem., , and . Networks, 64 (1): 48-64 (2014)On Risk-Averse Weighted k-Club Problems., , , and . Examining Robustness and Vulnerability of Networked Systems, volume 37 of NATO Science for Peace and Security Series, D: Information and Communication Security, IOS Press, (2014)Formation Control With Multiplex Information Networks., , and . IEEE Trans. Contr. Sys. Techn., 28 (2): 462-476 (2020)Optimization of Value-at-Risk: computational aspects of MIP formulations., , and . JORS, 69 (5): 676-690 (2018)Finding groups with maximum betweenness centrality., , and . Optim. Methods Softw., 32 (2): 369-399 (2017)Branch and bound algorithms for the multidimensional assignment problem., , and . Optim. Methods Softw., 20 (1): 127-143 (2005)A polyhedral approach to least cost influence maximization in social networks., , and . J. Comb. Optim., 45 (1): 44 (2023)Adaptive Video Encoding and Dynamic Channel Access for Real-time Streaming over SDRs., , , and . IPCCC, page 1-9. IEEE, (2018)Remarks on the attainable distributions of controlled-diffusion processes of distributed systems., and . ACC, page 6574-6579. IEEE, (2016)