Evangelos Kranakis
#152,228
Most Influential Person Now
Researcher
Evangelos Kranakis's AcademicInfluence.com Rankings
Evangelos Kranakismathematics Degrees
Mathematics
#7034
World Rank
#9640
Historical Rank
Graph Theory
#91
World Rank
#99
Historical Rank
Measure Theory
#1810
World Rank
#2215
Historical Rank

Download Badge
Computer Science Mathematics
Why Is Evangelos Kranakis Influential?
(Suggest an Edit or Addition)Evangelos Kranakis's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Compass routing on geometric networks (1999) (991)
- Power consumption in packet radio networks (2000) (441)
- Structural RNA has lower folding energy than random RNA of the same dinucleotide frequency. (2005) (229)
- DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE (2003) (209)
- Enhancing intrusion detection in wireless networks using radio frequency fingerprinting (2004) (192)
- Approximating the unsatisfiability threshold of random formulas (1998) (190)
- On the false-positive rate of Bloom filters (2008) (185)
- Random Constraint Satisfaction: A More Accurate Picture (1997) (157)
- Detecting rogue devices in bluetooth networks using radio frequency fingerprinting (2006) (143)
- Tree exploration with little memory (2002) (142)
- DNS-based Detection of Scanning Worms in an Enterprise Network (2005) (140)
- Pretty Secure BGP, psBGP (2005) (132)
- Asynchronous Deterministic Rendezvous in Graphs (2005) (131)
- Efficient Routing in Networks with Long Range Contacts (2001) (130)
- Mobile agent rendezvous in a ring (2003) (121)
- On interdomain routing security and pretty secure BGP (psBGP) (2007) (118)
- Boolean Functions and Computation Models (2002) (118)
- Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region (2008) (112)
- Detecting Impersonation Attacks in Future Wireless and Mobile Networks (2005) (112)
- Primality and cryptography (1991) (106)
- Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks (2003) (102)
- Fault-Tolerant Broadcasting in Radio Networks (2001) (95)
- Rigorous results for random (2+p)-SAT (2001) (91)
- Principles of ad hoc networking (2007) (87)
- Radio frequency fingerprinting for intrusion detection in wirless networks (2005) (85)
- Mobile Agent Rendezvous: A Survey (2006) (84)
- Boundary Patrolling by Mobile Agents with Distinct Maximal Speeds (2011) (83)
- Multiple Mobile Agent Rendezvous in a Ring (2004) (83)
- On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment (2010) (81)
- The Mobile Agent Rendezvous Problem in the Ring (2010) (75)
- On Minimizing the Sum of Sensor Movements for Barrier Coverage of a Line Segment (2010) (72)
- Anomaly-based intrusion detection using mobility profiles of public transportation users (2005) (70)
- Directional Versus Omnidirectional Antennas for Energy Consumption and k-Connectivity of Networks of Sensors (2004) (69)
- Towards a General Theory (1986) (68)
- On Multi-Label Linear Interval Routing Schemes (1996) (60)
- Computing Boolean Functions on Anonymous Networks (1990) (59)
- Atomic Multireader Register (1987) (58)
- Complexity of Barrier Coverage with Relocatable Sensors in the Plane (2013) (57)
- Communication in wireless networks with directional antennas (2008) (56)
- Probabilistic protocols for node discovery in ad-hoc, single broadcast channel networks (2003) (53)
- Power Consumption in Packet Radio Networks (Extended Abstract) (1997) (52)
- Boolean functions, invariance groups and parallel complexity (1989) (51)
- Searching with Uncertainty (1999) (47)
- Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers (2009) (46)
- A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs (2013) (46)
- Evacuating Robots via Unknown Exit in a Disk (2014) (46)
- On key distribution via true broadcasting (1994) (45)
- Bubbles: adaptive routing scheme for high-speed dynamic networks (1995) (45)
- Strategies for Hotlink Assignments (2000) (45)
- Bounds for Frequency Estimation of Packet Streams (2003) (44)
- The Impact of Knowledge on Broadcasting Time in Radio Networks (1999) (43)
- Mobile Agent Rendezvous in a Synchronous Torus (2006) (40)
- Local Algorithms for Dominating and Connected Dominating Sets of Unit Disk Graphs with Location Aware Nodes (2008) (39)
- Improving Distance Based Geographic Location Techniques in Sensor Networks (2004) (39)
- Optimal patrolling of fragmented boundaries (2013) (38)
- Evacuating Robots from a Disk Using Face-to-Face Communication (Extended Abstract) (2015) (38)
- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) (2004) (38)
- Sorting and election in anonymous asynchronous rings (2004) (37)
- Better Adaptive Diagnosis of Hypercubes (2000) (36)
- WPP: A Secure Payment Protocol For Supporting Credit- And Debit -Card Transactions Over Wireless Networks (2001) (35)
- Search on a line with faulty robots (2016) (34)
- Probabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks (2003) (34)
- A Simple Proof of the Representation of Bipartite Planar Graphs as the Contact Graphs of Orthogonal Straight Line Segments (1998) (34)
- Randomized Rendez-Vous with Limited Memory (2008) (34)
- Wireless Autonomous Robot Evacuation from Equilateral Triangles and Squares (2015) (33)
- Detecting intra-enterprise scanning worms based on address resolution (2005) (33)
- Distributed algorithms for barrier coverage using relocatable sensors (2013) (33)
- Morelia Test: Improving the Efficiency of the Gabriel Test and Face Routing in Ad-Hoc Networks (2004) (32)
- Strong Connectivity in Sensor Networks with given Number of Directional Antennae of Bounded Angle (2010) (32)
- Half-Space Proximal: A New Local Test for Extracting a Bounded Dilation Spanner of a Unit Disk Graph (2005) (32)
- Enhancing Hyperlink Structure for Improving Web Performance (2002) (31)
- Optimal Memory Rendezvous of Anonymous Mobile Agents in a Unidirectional Ring (2006) (31)
- Search on a Line by Byzantine Robots (2016) (31)
- Approximate Hotlink Assignment (2001) (31)
- Approximate Range Mode and Range Median Queries (2005) (30)
- Distributed computing on anonymous hypercube networks (1991) (30)
- Strategies for fast scanning and handovers in WiMAX/802.16 (2007) (30)
- Improving Customer Proximity to Railway Stations (2003) (29)
- Analysis of Threats to the Security of EPC Networks (2008) (29)
- Memoryless Search Algorithms in a Network with Faulty Advice (2002) (29)
- S-RIP: A Secure Distance Vector Routing Protocol (2004) (28)
- When Patrolmen Become Corrupted: Monitoring a Graph Using Faulty Mobile Robots (2015) (27)
- The impact of information on broadcasting time in linear radio networks (2002) (27)
- Mobile Agents Rendezvous When Tokens Fail (2004) (27)
- Searching with Mobile Agents in Networks with Liars (2000) (27)
- Link length of rectilinear Hamiltonian tours in grids (1994) (27)
- Neighbor Discovery in a Sensor Network with Directional Antennae (2011) (26)
- Symmetry and computability in anonymous networks: a brief survey (1996) (26)
- Local Construction of Planar Spanners in Unit Disk Graphs with Irregular Transmission Ranges (2006) (26)
- Evacuation from a Disc in the Presence of a Faulty Robot (2017) (25)
- The VC-dimension of Set Systems Defined by Graphs (1997) (25)
- Anonymous Wireless Rings (1995) (25)
- Expected sum and maximum of displacement of random sensors for coverage of a domain: extended abstract (2013) (25)
- Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks (2003) (25)
- Tracking Darkports for Network Defense (2007) (25)
- Hop-congestion trade-offs for high-speed networks (1995) (24)
- Incremental Construction of k-Dominating Sets in Wireless Sensor Networks (2006) (24)
- God Save the Queen (2018) (24)
- Isomorphic Triangulations with Small Number of Steiner Points (1999) (23)
- Location-free link state routing for underwater acoustic sensor networks (2015) (23)
- ARP-based Detection of Scanning Worms Within an Enterprise Network (2005) (23)
- Local PTAS for Independent Set and Vertex Cover in Location Aware Unit Disk Graphs? (2008) (22)
- Maintaining Connectivity in Sensor Networks Using Directional Antennae (2011) (22)
- Optimal Coteries and Voting Schemes (1994) (22)
- A Proof Technique for Register Automicity (1988) (22)
- Sensor network connectivity with multiple directional antennae of a given angular sum (2009) (22)
- Asymptotics of Canonical and Saturated RNA Secondary Structures (2009) (22)
- Deterministic M2M multicast in radio networks (2006) (21)
- Security Threats on EPC Based RFID Systems (2008) (21)
- On Convergence and Threshold Properties of Discrete Lotka-Volterra Population Protocols (2015) (21)
- Simulation of underwater communications with a colored noise approximation and mobility (2015) (21)
- Satellite transport protocol handling bit corruption, handoff and limited connectivity (2005) (21)
- Evacuating two robots from multiple unknown exits in a circle (2016) (21)
- Lower Bounds for Compact Routing (Extended Abstract) (1996) (20)
- Locating Information with Uncertainty in Fully Interconnected Networks (2000) (20)
- Strategies for fast scanning, ranging and handovers in WiMAX/802.16 (2008) (20)
- Search-and-Fetch with 2 Robots on a Disk - Wireless and Face-to-Face Communication Models (2016) (20)
- Group Search and Evacuation (2019) (20)
- Secure Wireless Payment Protocol (2003) (19)
- Optimal Adaptive Fault Diagnosis for Simple Multiprocessor Systems (1999) (18)
- A better upper bound for the unsatisfiability threshold (1996) (18)
- Priority Evacuation from a Disk Using Mobile Robots (2018) (18)
- On the page number of RNA secondary structures with pseudoknots (2012) (18)
- The Power of Tokens: Rendezvous and Symmetry Detection for Two Mobile Agents in a Ring (2008) (18)
- Search-and-Fetch with One Robot on a Disk - (Track: Wireless and Geometry) (2016) (18)
- Advances in Network Analysis and its Applications (2012) (18)
- Balancing Traffic Load Using One-Turn Rectilinear Routing (2008) (17)
- Handling Security Threats to the RFID System of EPC Networks (2009) (17)
- Exposure Maps: Removing Reliance on Attribution During Scan Detection (2006) (17)
- Approximating the Unsatisfiability Threshold of Random Formulas (Extended Abstract) (1996) (17)
- Time-Message Trade-Offs for the Weak Unison Problem (1994) (17)
- Local PTAS for Dominating and Connected Dominating Set in Location Aware Unit Disk Graphs (2009) (17)
- Power strip packing of malleable demands in smart grid (2013) (16)
- The Beachcombers' Problem: Walking and Searching with Mobile Robots (2013) (16)
- Broadcasting in Unlabeled Hypercubes with a Linear Number of Messages (1998) (16)
- Linear Search with Terrain-Dependent Speeds (2017) (15)
- Optimal charging strategies for electrical vehicles under real time pricing (2014) (15)
- Using Mobility Profiles for Anomaly-based Intrusion Detection in Mobile Networks (2005) (15)
- Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes (2011) (15)
- Fault-Tolerant Broadcasting in Radio Networks (Extended Abstract) (1998) (15)
- Mitigation of topology control traffic attacks in OLSR networks (2010) (15)
- On the Displacement for Covering a $d-$dimensional Cube with Randomly Placed Sensors (2015) (15)
- On the displacement for covering a unit interval with randomly placed sensors (2015) (15)
- Coverage and Connectivity in Networks with Directional Sensors (2004) (15)
- Weak Coverage of a Rectangular Barrier (2017) (14)
- Efficient Regular Polygon Dissections (1998) (14)
- On the event distance of Poisson processes with applications to sensors (2014) (14)
- Displacing Random Sensors to Avoid Interference (2014) (14)
- Proceedings of the 13th annual ACM international conference on Mobile computing and networking (2007) (14)
- On proving register atomicity (1987) (14)
- Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (2007) (13)
- Fixed Point Equations with Parameters in the Projective Model (1987) (13)
- Computing Majority with Triple Queries (2011) (13)
- On Multi-Label Linear Interval Routing Schemes (Extended Abstract) (1993) (13)
- Addressing Malicious SMTP-based Mass-Mailing Activity Within an Enterprise Network (12)
- Localization for a system of colliding robots (2013) (12)
- An Algorithmic Theory of Mobile Agents (2006) (12)
- Connectivity and stretch factor trade-offs in wireless sensor networks with directional antennae (2015) (12)
- Route discovery with constant memory in oriented planar geometric networks (2004) (12)
- Patrolling a Path Connecting a Set of Points with Unbalanced Frequencies of Visits (2017) (12)
- Discrete Realizations of Contact and Intersection Graphs (1997) (12)
- Rendezvous of Many Agents with Different Speeds in a Cycle (2015) (12)
- Doppler Effect in the Acoustic Ultra Low Frequency Band for Wireless Underwater Networks (2018) (11)
- Reflection and partition properties of admissible ordinals (1982) (11)
- A Selective Introduction to Border Gateway Protocol ( BGP ) Security Issues (2005) (11)
- Minimizing Congestion of Layouts for ATM Networks with Faulty Links (1996) (11)
- Asymptotic expected number of base pairs in optimal secondary structure for random RNA using the Nussinov-Jacobson energy model (2007) (11)
- Random maximal independent sets and the unfriendly theater seating arrangement problem (2009) (11)
- Flipping your Lid (2001) (11)
- Broadcasting in Unlabeled Tori (1998) (11)
- Proactive Threshold Cryptosystem for EPC Tags (2011) (11)
- On the temporal authentication of digital data (1999) (11)
- Impact of Locality on Location Aware Unit Disk Graphs (2008) (11)
- Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, ADHOC-NOW 2004, Vancouver, Canada, July 22-24, 2004, Proceedings (Lecture Notes in Computer Science) (2004) (10)
- Optimal Circle Search Despite the Presence of Faulty Robots (2019) (10)
- Analysing local algorithms in location-aware quasi-unit-disk graphs (2011) (10)
- Local 7-Coloring for Planar Subgraphs of Unit Disk Graphs (2011) (10)
- Patrolling Trees with Mobile Robots (2016) (10)
- Dissections, cuts and triangulations (1999) (10)
- Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol (2011) (10)
- Randomized Protocols for Node Discovery in Ad-hoc Multichannel Broadcast Networks (2002) (10)
- Priority evacuation from a disk: The case of n = 1, 2, 3 (2020) (10)
- Labeled versus Unlabeled Distributed Cayley Networks (1995) (10)
- Traversal of a quasi-planar subdivision without using mark bits (2004) (10)
- Games on triangulations (2005) (9)
- Guarding the Convex Subsets of a Point-set (2000) (9)
- Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band (2017) (9)
- Energy Consumption of Group Search on a Line (2019) (9)
- Position discovery for a system of bouncing robots (2012) (9)
- The Hotlink Optimizer (2002) (9)
- Security Issues in Link State Routing Protocols for MANETs (2012) (9)
- Stretch Factor in Wireless Sensor Networks with Directional Antennae (2012) (9)
- Security Threat Mitigation Trends in Low-Cost RFID Systems (2009) (9)
- Robust Sensor Range for Constructing Strongly Connected Spanning Digraphs in UDGs (2012) (9)
- Location-Oblivious Distributed Unit Disk Graph Coloring (2011) (9)
- Symmetry Breaking in the Plane: Rendezvous by Robots with Unknown Attributes (2019) (9)
- Searching with Advice: Robot Fence-Jumping (2016) (9)
- Polygon Cutting: Revisited (1998) (9)
- Distributed computing on Cayley networks (1992) (9)
- Local Maximal Matching and Local 2-Approximation for Vertex Cover in UDGs (2008) (8)
- Cooperative Neighbor Discovery Protocol for a Wireless Network Using Two Antenna Patterns (2012) (8)
- Patrolling by Robots Equipped with Visibility (2014) (8)
- Connectivity Trade-offs in 3D Wireless Sensor Networks Using Directional Antennae (2011) (8)
- Sensor allocation problems on the real line (2016) (8)
- Fun with Algorithms (2012) (8)
- The eXtended Satellite Transport Protocol: Its Design and Evaluation (2003) (8)
- Local Construction and Coloring of Spanners of Location Aware Unit Disk Graphs (2008) (8)
- A Geometric Routing Protocol in Disruption Tolerant Network (2009) (8)
- Bounded Length, 2-Edge Augmentation of Geometric Planar Graphs (2010) (8)
- Capacity Requirements in Networks of Quantum Repeaters and Terminals (2020) (8)
- Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks (2006) (8)
- Geocaching-inspired Resilient Path Planning for Drone Swarms (2019) (7)
- Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval (2001) (7)
- On the Number of Directions in Visibility Representations (1994) (7)
- On realizing shapes in the theory of RNA neutral networks. (2005) (7)
- Inapproximability of the Perimeter Defense Problem (2009) (7)
- Perfect Broadcasting in Unlabeled Networks (1998) (7)
- Distributed Dynamic Storage in Wireless Networks (2005) (7)
- Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications (2019) (7)
- Memory Requirements for Local Geometric Routing and Traversal in Digraphs (2008) (7)
- Station Layouts in the Presence of Location Constraints (1999) (7)
- Evaluation of Anonymized ONS Queries (2009) (7)
- On the Displacement for Covering a Square with Randomly Placed Sensors (2015) (7)
- Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks (2011) (7)
- Near optimal-partitioning of rectangles and prisms (1999) (7)
- Deterministic M2M Multicast in Radio Networks: (Extended Abstract) (2004) (7)
- Approximating the projective model (1987) (7)
- A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model (2014) (7)
- Searching for majority with k-tuple queries (2015) (7)
- Credentials and beliefs in remote trusted platforms attestation (2006) (7)
- Strategies for Service Discovery over Ad Hoc Networks (2006) (7)
- Deterministic symmetric rendezvous with tokens in a synchronous torus (2011) (6)
- A Tight Bound on the Maximum Interference of Random Sensors in the Highway Model (2010) (6)
- Planar Stage Graphs: Characterizations and Applications (1997) (6)
- Gathering in the Plane of Location-Aware Robots in the Presence of Spies (2017) (6)
- Strong Connectivity of Sensor Networks with Double Antennae (2012) (6)
- Sorting multisets in anonymous rings (2000) (6)
- Algorithms for Packing Two Circles in a Convex Polygon (1998) (6)
- An integrated approach to detection of fast and slow scanning worms (2009) (6)
- Computing with Mobile Agents in Distributed Networks (2007) (6)
- Time-Energy Tradeoffs for Evacuation by Two Robots in the Wireless Model (2019) (6)
- Local Edge Colouring of Yao-Like Subgraphs of Unit Disk Graphs (2007) (6)
- Assigning Bookmarks in Perfect Binary Trees (2007) (6)
- Communication in Random Geometric Radio Networks with Positively Correlated Random Faults (2008) (6)
- Using time-of-day and location-based mobility profiles to improve scanning during handovers (2010) (6)
- Randomized rendezvous with limited memory (2011) (6)
- Enumeration and visibility problems in integer lattices (1990) (6)
- The Sound of Communication in Underwater Acoustic Sensor Networks - (Position Paper) (2017) (6)
- Different Speeds Suffice for Rendezvous of Two Agents on Arbitrary Graphs (2017) (6)
- Implicit Routing and Shortest Path Information (Extended Abstract) (1995) (5)
- Almost optimal on-line search in unknown streets (1997) (5)
- Invited Talk: Symmetry and Computability in Anonymous Networks (1996) (5)
- Ad-Hoc, Mobile, and Wireless Networks: Second International Conference, ADHOC-NOW 2003, Montreal, Canada, October 8-10, 2003, Proceedings (2003) (5)
- A brief survey of concurrent readers and writers (1989) (5)
- Definable Ultrafilters and end Extension of Constructible Sets (1982) (5)
- Linear Rendezvous with Asymmetric Clocks (2018) (5)
- Optimal online and offline algorithms for robot-assisted restoration of barrier coverage (2014) (5)
- Rendezvous on a Line by Location-Aware Robots Despite the Presence of Byzantine Faults (2017) (5)
- Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds (2015) (5)
- Communication in Networks with Random Dependent Faults (2007) (5)
- On the Complexity of the Multi-Robot, Multi-Depot Map Visitation Problem (2011) (5)
- Optimization Problems in Infrastructure Security (2015) (5)
- Maximum Interference of Random Sensors on a Line (2010) (5)
- String Recognition on Anonymous Rings (1995) (5)
- Fence Patrolling with Two-speed Robots (2016) (5)
- Camera placement in integer lattices (1994) (5)
- A Secure Payment Protocol For Supporting Credit-And Debit-Card Transactions Over Wireless Networks (2001) (4)
- Distributed storage in Disruption Tolerant Network (2010) (4)
- Implicit Routing And Shortest Path Information (1995) (4)
- Computing boolean functions on Cayley networks (extended abstract) (1990) (4)
- Distributed Computing on Anonymous Hypercubes with Faulty Components (Extended Abstract) (1992) (4)
- Refracted Acoustic Communications in Wireless Underwater Sensor Networks with Mobility (2015) (4)
- Baked Potato Routing (1999) (4)
- Vc-Dimensions For Graphs (1994) (4)
- Definable Ultrapowers and Ultrafilters over Admissible Ordinals (1984) (4)
- The Urinal Problem (2010) (4)
- Distributed Key Establishment in Disruption Tolerant Location Based Social Wireless Sensor and Actor Network (2011) (4)
- Positioning of Wireless Sensor Nodes in the Presence of Liars (2010) (4)
- Maximal Length Common Non-intersecting Paths (1996) (4)
- Baked potatoes: deadlock prevention via scheduling (1996) (4)
- Endpoint-Driven Intrusion Detection and Containment of Fast Spreading Worms in Enterprise Networks (2007) (4)
- Computing boolean functions on anonymous hypercube networks : extended abstract (1990) (4)
- Uninterrupted Coverage of a Planar Region with Rotating Directional Antennae (2012) (4)
- Counting Problems Relating to a Theorem of Dirichlet (1994) (4)
- Survivability of Swarms of Bouncing Robots (2014) (4)
- Approximating the Edge Length of 2-Edge Connected Planar Geometric Graphs on a Set of Points (2011) (4)
- Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (2019) (4)
- Eecient Routing in Networks with Long Range Contacts (extended Abstract) ? (2001) (4)
- Priority evacuation from a disk: The case of n ≥ 4 (2020) (4)
- Location Oblivious Distributed Unit Disk Graph Coloring (2007) (3)
- VC-Dimensions for Graphs (Extended Abstract) (1995) (3)
- Maintaining Privacy on a Line (2011) (3)
- 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, Ottawa, Canada, July 8-10, 2009 (2009) (3)
- Locating information with uncertainty in fully interconnected networks: The case of nondistributed memory (2003) (3)
- Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks (2010) (3)
- On Recognizing a String on an Anonymous Ring (2000) (3)
- Stepping up lemmas in definable partitions (1984) (3)
- Gathering and Election by Mobile Robots in a Continuous Cycle (2019) (3)
- The Pony Express Communication Problem (2021) (3)
- Routing and Traversal via Location Awareness in Ad Hoc Networks (2005) (3)
- Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors (2015) (3)
- Rectilinear Glass-Cut Dissections of Rectangles to Squares (2007) (3)
- Domino tilings and two-by-two squares (1997) (3)
- Partitions and homogeneous sets for admissible ordinals (1984) (3)
- Domino tilings of orthogonal polygons (1999) (3)
- Intrusion detection and radio frequency fingerprinting in mobile and wireless networks (2003) (3)
- Weighted Distributed Match-Making (1988) (3)
- Monitoring the Plane with Rotating Radars (2015) (3)
- Boolean Routing on Cayley Networks (1996) (3)
- The Multi-source Beachcombers' Problem (2014) (3)
- Exploring Graphs with Time Constraints by Unreliable Collections of Mobile Robots (2017) (3)
- Proceedings of the 6th international conference on Fun with Algorithms (2012) (3)
- Reconstructing Cactus Graphs from Shortest Path Information - (Extended Abstract) (2016) (2)
- Ad-Hoc, Mobile, and Wireless Networks: Second International Conference, ADHOC-NOW 2003Montreal, Canada, October 8-10, 2003, Proceedings (Lecture Notes in Computer Science) (2003) (2)
- Learning to Communicate Underwater: An Exploration of Limited Mobility Agents (2017) (2)
- The diameter and connectivity of networks with random dependent faults (2010) (2)
- Asymptotic structural properties of quasi-random saturated structures of RNA (2013) (2)
- Special Issue on Typical Case Complexity and Phase Transitions (2005) (2)
- Strong Orientations of Planar Graphs with Bounded Stretch Factor (2010) (2)
- A Hop Count Based Greedy Face Greedy Routing Protocol on Localized Geometric Spanners (2009) (2)
- Low Frequency Mobile Communications in Underwater Networks (2018) (2)
- Modeling host-based detection and active worm containment (2008) (2)
- Online routing in quasi-planar and quasi-polyhedral graphs (2006) (2)
- Foundations and practice of security : 8th international symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers (2016) (2)
- Excuse me! or the courteous theatregoers' problem (2014) (2)
- Definable Ramsey and definable Erdös ordinals (1983) (2)
- Routing on Delay Tolerant Sensor Networks (2009) (2)
- LOCAL PTAS FOR DOMINATING AND CONNECTED DOMINATING SET IN LOCATION AWARE UDGS (2007) (2)
- Security Issues in the Border Gateway Protocol ( BGP ) (2005) (2)
- Asymptotically optimal scheduling of random malleable demands in smart grid (2018) (2)
- Group search of the plane with faulty robots (2019) (2)
- Optimizing Web Server's Data Transfer with Hotlinks (2003) (2)
- A Proactive Threshold Secret Sharing Scheme Handling Gen2 Privacy Threats (2009) (2)
- Stage-graph Representations (1997) (2)
- Secure Routing Protocols Using Consistency Checks and S-RIP (2003) (2)
- DISTRIBUTED COMPUTING ON CAYLEY NETWORKS (Extended Abstract) (1992) (2)
- Invisible Ordinals and Inductive Definitions (1982) (2)
- A new analytic model for the cognitive radio jump-stay algorithm (2013) (2)
- A PROOF TECHNIQUE FOR REGISTER ATOMICITY (Preliminary Version) (2006) (2)
- Search and evacuation with a near majority of faulty agents (2021) (2)
- Optimal packing of similar triangles (1989) (2)
- Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks (2021) (2)
- Channel selection using a multiple radio model (2016) (2)
- LATIN 2016: Theoretical Informatics (2016) (2)
- Research Trends in Collaborative Drones (2022) (2)
- Routing with uncertainty in the position of the destination (2006) (2)
- Distributed computing on oriented anonymous hypercubes with faulty components (2001) (2)
- The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model (2014) (2)
- Detection of slow malicious worms using multi-sensor data fusion (2009) (2)
- Definable partitions and reflection properties for regular cardinals (1985) (2)
- Symmetry and Computational Complexity of Boolean Functions: Problems and Results (2002) (2)
- Message Delivery in the Plane by Robots with Different Speeds (2021) (2)
- Searching for a Non-adversarial, Uncooperative Agent on a Cycle (2017) (2)
- Authenticity, Integrity, and Replay Protection in Quantum Data Communications and Networking (2022) (2)
- Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition (2020) (2)
- Boolean Functions and Circuits (2002) (2)
- A brief survey of art gallery problems in integer lattice systems (1991) (1)
- The complexity of data mining on the Web (1996) (1)
- Optimal Shooting: Characterizations and Applications (1995) (1)
- Approximate Maxima Finding of Continuous Functions under Restricted Budget (1998) (1)
- Asymptotic Number of Hairpins of Saturated RNA Secondary Structures (2013) (1)
- Strong Connectivity of Wireless Sensor Networks with Double Directional Antennae in 3D (2013) (1)
- Bike Assisted Evacuation on a Line (2021) (1)
- Asymptotic structural properties of quasi-random saturated structures of RNA (2013) (1)
- Weak Coverage of a Rectangular Barrier (2019) (1)
- Local Algorithms for Topology Control in Ad-Hoc Networks (2011) (1)
- Asymptotic convex optimization for packing random malleable demands in smart grid (2013) (1)
- Group Evacuation on a Line by Agents with Different Communication Abilities (2021) (1)
- The Bike Sharing Problem (2020) (1)
- LATIN 2016: Theoretical Informatics : 12th Latin American Symposium, Ensenada, Mexico, April 11-15, 2016, Proceedings (2016) (1)
- QoS and security in Link State Routing protocols for MANETs (2013) (1)
- Circuit Lower Bounds (2002) (1)
- Boolean Functions: Parallel Computation and Proof Systems (1997) (1)
- Definable Partitions and the Projectum (1985) (1)
- Lower bounds for a class of Kostka numbers (1986) (1)
- GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡ (2019) (1)
- Information Spreading by Mobile Particles on a Line (2015) (1)
- Proceedings of the 8th Canadian Conference on Computational Geometry, Carleton University, Ottawa, Canada, August 12-15, 1996 (1996) (1)
- Evaluation of Hotlink Assignment Heuristi s forImproving Web (2001) (1)
- Know When to Persist: Deriving Value from a Stream Buffer - (Extended Abstract) (2016) (1)
- Deterministic M 2 M Multicast in Radio Networks ( Extended Abstract ) (2004) (1)
- Constant memory routing in quasi-planar and quasi-polyhedral graphs (2008) (1)
- Analysis of threats on EPC based RFID systems (2007) (1)
- Distributed Patrolling with Two-Speed Robots (and an Application to Transportation) (2016) (1)
- Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings (2007) (1)
- Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007 (2007) (1)
- Distributed computing on anonymou hypercube networks (1997) (1)
- Wireless Network Programming (2007) (1)
- Broadcasting in Unlabeled Networks (1996) (1)
- Risky Zone Avoidance Strategies for Drones (2021) (1)
- Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks (Extended Abstract) (2003) (1)
- WIMAX/802.16 BROADBAND WIRELESS NETWORKS (2010) (1)
- Treasure evacuation with one robot on a disk (2021) (1)
- Optimal rendezvous on a line by location-aware robots in the presence of spies* (2021) (1)
- Planar Subgraphs without Low-Degree Nodes (2011) (1)
- A note on weighted distributed match-making (2008) (1)
- Approximation Algorithms for the Antenna Orientation Problem (2013) (1)
- Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks (2007) (1)
- Distributed control in computer networks and cross-sections of colored multidimensional bodies (1986) (1)
- Enumeration and visibility problems in integer lattices (extended abstract) (1990) (1)
- Sorting Multisets and Electing a Leader in Anonymous Rings (2000) (1)
- Circuit Upper Bounds (2002) (0)
- Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks (2023) (0)
- Maintaining Privacy on a Line (2011) (0)
- Optimal Routing on Delay Tolerant Grids (2009) (0)
- Flipping your (2000) (0)
- BOOLEAN FUNCTIONS, INVARIANCE GROUPS AND PARALLEL COMPLEXITY (Extended Abstract) (1989) (0)
- Strongly connected orientations of plane graphs (2013) (0)
- Baked Potatoes: Deadlock Prevention Via Scheduling (Abstract). (1996) (0)
- New books and journals (2003) (0)
- Ad Hoc Network Protocols (2007) (0)
- Editorial: Fun with Algorithms (2014) (0)
- Towards Host-based Detection and Collaborative Network Containment of Fast Spreading Active Worms (0)
- Panel: Authentication in Constrained Environments (2005) (0)
- Optimal Control for Platooning in Vehicular Networks (2022) (0)
- Mobile Agents and Exploration (1952; (2007) (0)
- Ad Hoc Wireless Access (2007) (0)
- High-speed Networks (1998) (0)
- 2 FLOCCHINI AND KRANAKIS AND KRIZANC AND LUCCIO AND SANTORO 1 (2007) (0)
- Search on a line with faulty robots (2017) (0)
- Isomorphic Triangulations with Minimal Number of Steiner Points (1994) (0)
- Games on Triangulations [ Dagstuhl version ] (0)
- Optimizing Data Throughput in Client/Server Systems by keeping Queue Sizes Balanced (2012) (0)
- Robot Evacuation on a Line Assisted by a Bike (2021) (0)
- Medium Access Control (2007) (0)
- Guest Editorial: Special Issue on Theoretical Informatics (2017) (0)
- Wireless Data Communications (2007) (0)
- LocaledgecolouringofYao-likesubgraphsofUnitDiskGraphs I (2009) (0)
- Graph Exploration by Energy-Sharing Mobile Agents (2021) (0)
- Algorithms for Sensor Systems: 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed ... September 5-6, 2013, Revised Selected Papers (2013) (0)
- Tracking Mobile Users in Cellular Networks using Timing Information (2008) (0)
- Optimal Task Offloading Policy in Discrete-Time Systems with Firm Deadlines (2022) (0)
- Asymptotic Number of Hairpins of Saturated RNA Secondary Structures (2013) (0)
- Special Issue: Selected Areas in Cryptography - Introduction (1997) (0)
- Tracking Users in Cellular Networks using Timing Information (2003) (0)
- Propositional Proof Systems (2002) (0)
- Patrolling with Mobile Robots (2011) (0)
- Algorithms for Pa king Two Cir les in a (2007) (0)
- Optimal Balancing of Satellite Queues in Packet Transmission to Ground Stations (2010) (0)
- Delivery to Safety with Two Cooperating Robots (2022) (0)
- Machine Models and Function Algebras (2002) (0)
- Camera placement in integer lattices : extended abstract (1990) (0)
- Optimal Policy for Task Migration to UAV in Discrete-Time Systems with Firm Deadlines (2022) (0)
- Guest Editorial: Special Issue on Theoretical Informatics (2017) (0)
- Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping (2010) (0)
- The Buffer Potential of a Network (1994) (0)
- Foundations and Practice of Security (2015) (0)
- Playing with Triangulations (2002) (0)
- Selected areas in cryptography (1997) (0)
- 1 . 2 Our Model , Problem Definition & Notation (2016) (0)
- Channel Selection Using a Multiple Radio Model 1 (2017) (0)
- Overcoming Probabilistic Faults in Disoriented Linear Search (2023) (0)
- Distributed algorithms for barrier coverage using relocatable sensors (2016) (0)
- Cutting Circles into Equal Area Pieces 1 (2006) (0)
- Editorial: Fun with Algorithms (2013) (0)
- Line Search for an Oblivious Moving Target (2022) (0)
- Placing mirrors in grids (1989) (0)
- Preface: Volume 16 (2003) (0)
- HIGH-SPEED NETWORKS (Introduction to Minitrack) (1996) (0)
- Approximate Maxima Finding of Continuous Functions Under Restricted Budget (Extended Abstract) (1996) (0)
- Minimizing The Maximum Distance Traveled To Form Patterns With Systems of Mobile Robots (2020) (0)
- Heterogeneous Server Placement in the Network Centric Computing Paradigm (1997) (0)
- Public Key Cryptosystems (1986) (0)
- Ray shooting from convex ranges (2001) (0)
- Survivability of bouncing robots (2016) (0)
- Ad-Hoc, Mobile, and Wireless Networks (2004) (0)
- On the Page Number of Secondary Structures with Pseudoknots (2011) (0)
- Localization of a Mobile Node in Shaded Areas (2015) (0)
- Symmetry Breaking in the Plane (2019) (0)
- Preface: INTERNET 2009 (2009) (0)
- Existing Streets : Even a Single Track Is Hard (2002) (0)
- Displacing RandomSensors: Coverageand Interference Problems (2014) (0)
- Incremental construction of κ-dominating sets in wireless sensor networks (2006) (0)
- Asymptotics of Canonical RNA Secondary Structures (2009) (0)
- Establishing a Communication Infrastructure in Ad Hoc Networks (2008) (0)
- SecureRoutingProtocolsUsingConsistenc y ChecksandS-RIP (2003) (0)
- Ad-Hoc, Mobile, and Wireless Networks (2003) (0)
- Evacuation from a Disk for Robots with Asymmetric Communication (2022) (0)
- Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA (2022) (0)
- Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007 (2007) (0)
- Algorithms for Sensor Systems (2013) (0)
- Introduction to the Special Issue (2008) (0)
- Broadcasting in Networks of Unknown Topology in the Presence of Swamping (2014) (0)
- Plane and Planarity Thresholds for Random Geometric Graphs (2015) (0)
- Functional Dependencies of Variables in Wait-Free Programs (Extended Abstract) (1989) (0)
- Mobile Agents and Exploration (2008) (0)
- On the page number of RNA secondary structures with pseudoknots (2011) (0)
- Ad Hoc Network Security (2007) (0)
- Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks (2014) (0)
- Strategies for Surviving Aggressive Multiparty Repeated Standoffs (Extended Abstract) (2022) (0)
- Querying with Uncertainty (2017) (0)
- Evacuating Robots from an Unknown Exit in a Disk (2014) (0)
- On Tilable Orthogonal Polygons (1999) (0)
- Introduction to the Special Issue: Combinatorics and Geometry (2015) (0)
- Introduction to the Special Issue: Combinatorics and Geometry (2015) (0)
- Chapter 6 1 Security Issues in Link State Routing Protocols 2 for MANETs 3 (2012) (0)
- The International Journal on Advances in Security is published by IARIA (2009) (0)
- Randomness and Satisfiability (2002) (0)
- RFID Systems: Electronic Product Code (EPC) Network Security Threats (2012) (0)
- Excuse Me! or The Courteous Theatregoers' Problem - (Extended Abstract) (2014) (0)
- When Patrolmen Become Corrupted: Monitoring a Graph Using Faulty Mobile Robots (2016) (0)
- Localization for a system of colliding robots (2014) (0)
- Broadcasting Session Keys (1994) (0)
- Network Computing for Distributed Underwater Acoustic Sensors (2014) (0)
- Pantographs and Phase Transitions for the Boundedness of Orbits (2020) (0)
- Fixpoint representations of characteristic sets of linear-time temporal formulas (1987) (0)
This paper list is powered by the following services:
Other Resources About Evangelos Kranakis
What Schools Are Affiliated With Evangelos Kranakis?
Evangelos Kranakis is affiliated with the following schools: