Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

19 Publications


2023 | Conference Paper | IST-REx-ID: 14735 | OA
C. Stefo, Z. Xiang, and E. Kokoris Kogias, “Executing and proving over dirty ledgers,” in 27th International Conference on Financial Cryptography and Data Security, Bol, Brac, Croatia, 2023, vol. 13950, pp. 3–20.
[Preprint] View | DOI | Download Preprint (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6163
R. Biswas, G. Largeteau-Skapin, R. Zrour, and E. Andres, “Rhombic dodecahedron grid—coordinate system and 3D digital object definitions,” in 21st IAPR International Conference on Discrete Geometry for Computer Imagery, Marne-la-Vallée, France, 2019, vol. 11414, pp. 27–37.
View | DOI
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
M. Walter, “Sampling the integers with low relative error,” in Progress in Cryptology – AFRICACRYPT 2019, vol. 11627, J. Buchmann, A. Nitaj, and T. Rachidi, Eds. Cham: Springer Nature, 2019, pp. 157–180.
[Preprint] View | DOI | Download Preprint (ext.)
 

2019 | Book Chapter | IST-REx-ID: 7453 | OA
R. Alur, M. Giacobbe, T. A. Henzinger, K. G. Larsen, and M. Mikučionis, “Continuous-time models for system design and analysis,” in Computing and Software Science, vol. 10000, B. Steffen and G. Woeginger, Eds. Springer Nature, 2019, pp. 452–477.
[Published Version] View | DOI | Download Published Version (ext.)
 

2018 | Conference Paper | IST-REx-ID: 8298
E. Androulaki, C. Cachin, A. De Caro, and E. Kokoris Kogias, “Channels: Horizontal scaling and confidentiality on permissioned blockchains,” in Computer Security, Barcelona, Spain, 2018, vol. 11098, pp. 111–131.
View | DOI
 

2017 | Conference Paper | IST-REx-ID: 12571 | OA
S. Bhattacharya, D. Chakrabarty, and M. H. Henzinger, “Deterministic fully dynamic approximate vertex cover and fractional matching in O(1) amortized update time,” in 19th International Conference on Integer Programming and Combinatorial Optimization, Waterloo, ON, Canada, 2017, vol. 10328, pp. 86–98.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2017 | Book Chapter | IST-REx-ID: 5803
R. Biswas and P. Bhowmick, “Construction of persistent Voronoi diagram on 3D digital plane,” in Combinatorial image analysis, vol. 10256, Cham: Springer Nature, 2017, pp. 93–104.
View | DOI
 

2016 | Conference Paper | IST-REx-ID: 5806
R. Biswas and P. Bhowmick, “On functionality of quadraginta octants of naive sphere with application to circle drawing,” in Discrete Geometry for Computer Imagery, Nantes, France, 2016, vol. 9647, pp. 256–267.
View | DOI
 

2014 | Conference Paper | IST-REx-ID: 5810
R. Biswas and P. Bhowmick, “On Finding Spherical Geodesic Paths and Circles in ℤ3,” vol. 8668. Springer, Berlin, Heidelberg, pp. 396–409, 2014.
View | DOI
 

2013 | Conference Paper | IST-REx-ID: 11793 | OA
M. H. Henzinger, S. Krinninger, and D. Nanongkai, “Sublinear-time maintenance of breadth-first spanning tree in partially dynamic networks,” in 40th International Colloquium on Automata, Languages, and Programming, Riga, Latvia, 2013, vol. 7966, pp. 607–619.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2013 | Conference Paper | IST-REx-ID: 11791 | OA
P. Dütting, M. H. Henzinger, and M. Starnberger, “Valuation compressions in VCG-based combinatorial auctions,” in 9th International Conference on Web and Internet Economics, Cambridge, MA, USA, 2013, vol. 8289, pp. 146–159.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2013 | Conference Paper | IST-REx-ID: 11792 | OA
W. Dvořák, M. H. Henzinger, and D. P. Williamson, “Maximizing a submodular function with viability constraints,” in 21st Annual European Symposium on Algorithms, Sophia Antipolis, France, 2013, vol. 8125, pp. 409–420.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2012 | Conference Paper | IST-REx-ID: 11794 | OA
P. Dütting, M. H. Henzinger, and M. Starnberger, “Auctions with heterogeneous items and budget limits,” in 8th International Workshop on Internet and Network Economics, Liverpool, United Kingdom, 2012, vol. 7695, pp. 44–57.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2012 | Conference Paper | IST-REx-ID: 10904
K. Chatterjee, M. Randour, and J.-F. Raskin, “Strategy synthesis for multi-dimensional quantitative objectives,” in CONCUR 2012 - Concurrency Theory, Newcastle upon Tyne, United Kingdom, 2012, vol. 7454, pp. 115–131.
[Preprint] View | Files available | DOI | arXiv
 

2011 | Conference Paper | IST-REx-ID: 11796
M. H. Henzinger and A. Vidali, “Multi-parameter mechanism design under budget and matroid constraints,” in 19th Annual European Symposium on Algorithms, Saarbrücken, Germany, 2011, vol. 6942, pp. 192–202.
View | DOI
 

2010 | Conference Paper | IST-REx-ID: 11797 | OA
J. Feldman, M. H. Henzinger, N. Korula, V. S. Mirrokni, and C. Stein, “Online stochastic packing applied to display ad allocation,” in 18th Annual European Symposium on Algorithms, Liverpool, United Kingdom, 2010, vol. 6346, pp. 182–194.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2010 | Conference Paper | IST-REx-ID: 11798
P. Dütting and M. H. Henzinger, “Mechanisms for the marriage and the assignment game,” in 7th International Conference on Algorithms and Complexity, Rome, Italy, 2010, vol. 6078, pp. 6–12.
View | DOI
 

2010 | Book Chapter | IST-REx-ID: 5940
G. Juhás, I. Kazlov, and A. Juhásová, “Instance Deadlock: A Mystery behind Frozen Programs,” in Applications and Theory of Petri Nets, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 1–17.
View | DOI
 

2009 | Conference Paper | IST-REx-ID: 11799
P. Dütting, M. H. Henzinger, and I. Weber, “Bidder optimal assignments for general utilities,” in 5th International Workshop on Internet and Network Economics, Rome, Italy, 2009, vol. 5929, pp. 575–582.
View | Files available | DOI
 

Filters and Search Terms

issn=1611-3349

Search

Filter Publications