Author of the publication

Recovery Oriented Programming.

, and . SSS, volume 4280 of Lecture Notes in Computer Science, page 152-168. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dolev, Shlomi
add a person with the name Dolev, Shlomi
 

Other publications of authors with the same name

Optimizing Cloud Data Lake Queries With a Balanced Coverage Plan., , , and . IEEE Trans. Cloud Comput., 12 (1): 84-99 (January 2024)Security and privacy aspects in MapReduce on clouds: A survey., , , and . Comput. Sci. Rev., (2016)When consensus meets self-stabilization., , and . J. Comput. Syst. Sci., 76 (8): 884-900 (2010)Location functions for self-stabilizing byzantine tolerant swarms., , , , , and . Theor. Comput. Sci., (2023)Bubbles: adaptive routing scheme for high-speed dynamic networks (Extended Abstract)., , , and . STOC, page 528-537. ACM, (1995)Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)., and . IACR Cryptology ePrint Archive, (2019)Information security for sensors by overwhelming random sequences and permutations., , , , and . Ad Hoc Networks, (2014)Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)., , , , and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 69-83. Springer, (2013)Spanders: distributed spanning expanders., and . SAC, page 1309-1314. ACM, (2010)RT oblivious erasure correcting., , and . IEEE/ACM Trans. Netw., 15 (6): 1321-1332 (2007)