Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managed Agreement: Generalizing two fundamental distributed agreement problems., , and . Inf. Process. Lett., 101 (5): 190-198 (2007)Unreliable Distributed Timing Scrutinizer to Converge toward\\ Decision Conditions., , and . Stud. Inform. Univ., 3 (1): 19-42 (2004)Probabilistic Analysis of Rumor-Spreading Time., , and . INFORMS J. Comput., 32 (1): 172-181 (2020)Tracking immediate predecessors in distributed computations., , and . SPAA, page 210-219. ACM, (2002)A Comparative Study of Rateless Codes for P2P Persistent Storage., and . SSS, volume 6366 of Lecture Notes in Computer Science, page 489-503. Springer, (2010)An extensive agent-based simulation study of sycomore++, a DAG-based permissionless ledger., , and . SAC, page 334-336. ACM, (2022)Probabilistic analysis of counting protocols in large-scale asynchronous and anonymous systems., , and . NCA, page 315-322. IEEE Computer Society, (2017)A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe., , , , and . ICDCS, page 22. IEEE Computer Society, (2006)Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings., , , , and . IFIPTM, volume 454 of IFIP Advances in Information and Communication Technology, page 92-108. Springer, (2015)A Secure Two-Phase Data Deduplication Scheme., , , and . HPCC/CSS/ICESS, page 802-809. IEEE, (2014)