Anton Krohmer

Orcid: 0000-0003-2060-5181

According to our database1, Anton Krohmer authored at least 16 papers between 2010 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Hyperbolic Embeddings for Near-Optimal Greedy Routing.
ACM J. Exp. Algorithmics, 2020

2018
Efficient Embedding of Scale-Free Graphs in the Hyperbolic Plane.
IEEE/ACM Trans. Netw., 2018

Unbounded Discrepancy of Deterministic Random Walks on Grids.
SIAM J. Discret. Math., 2018

On the Diameter of Hyperbolic Random Graphs.
SIAM J. Discret. Math., 2018

De-anonymization of Heterogeneous Random Graphs in Quasilinear Time.
Algorithmica, 2018

Cliques in Hyperbolic Random Graphs.
Algorithmica, 2018

Towards a Systematic Evaluation of Generative Network Models.
Proceedings of the Algorithms and Models for the Web Graph - 15th International Workshop, 2018

2017
Bounds on the Satisfiability Threshold for Power Law Distributed Random SAT.
Proceedings of the 25th Annual European Symposium on Algorithms, 2017

Phase Transitions for Scale-Free SAT Formulas.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Structures & algorithms in hyperbolic random graphs (Strukturen & Algorithmen in Hyperbolischen Zufallsgraphen)
PhD thesis, 2016

Hyperbolic Random Graphs: Separators and Treewidth.
Proceedings of the 24th Annual European Symposium on Algorithms, 2016

2015
Parameterized clique on inhomogeneous random graphs.
Discret. Appl. Math., 2015

Cliques in hyperbolic random graphs.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2012
Parameterized Clique on Scale-Free Networks.
Proceedings of the Algorithms and Computation - 23rd International Symposium, 2012

Efficient algorithms for extracting biological key pathways with global constraints.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

2010
RatFish: A File Sharing Protocol Provably Secure against Rational Users.
Proceedings of the Computer Security, 2010


  Loading...