Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IDABased Protocols for Reliable Multicast., and . OPODIS, page 137-152. Hermes, (1997)Local Labeling and Resource Allocation Using Preprocessing., , and . WDAG, volume 857 of Lecture Notes in Computer Science, page 194-208. Springer, (1994)Efficient Atomic Snapshots Using Lattice Agreement (Extended Abstract)., , and . WDAG, volume 647 of Lecture Notes in Computer Science, page 35-53. Springer, (1992)Lower Bound on the Step Complexity of Anonymous Binary Consensus., , and . DISC, volume 9888 of Lecture Notes in Computer Science, page 257-268. Springer, (2016)Polynominal and Adaptive Long-Lived (2k-1)-Renaming., and . DISC, volume 1914 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)A Correctness Condition for High-Performance Multiprocessors (Extended Abstract), and . STOC, page 679-690. ACM, (1992)Limited-Use Atomic Snapshots with Polylogarithmic Step Complexity., , , and . J. ACM, 62 (1): 3:1-3:22 (2015)Polylogarithmic concurrent data structures from monotone circuits., , and . J. ACM, 59 (1): 2:1-2:24 (2012)The Complexity of Updating Multi-writer Snapshot Objects., , and . ICDCN, volume 4308 of Lecture Notes in Computer Science, page 319-330. Springer, (2006)Lower bounds for restricted-use objects: extended abstract., , , and . SPAA, page 172-181. ACM, (2012)