Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond One Third Byzantine Failures., , , , and . CoRR, (2015)The Weakest Failure Detector for Message Passing Set-Agreement., , , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 109-120. Springer, (2008)Some New Results With k-set agreement., , and . CoRR, (2023)An Anonymous Wait-Free Weak-Set Object Implementation., , , and . NETYS, volume 11028 of Lecture Notes in Computer Science, page 141-156. Springer, (2018)The Computational Power of Distributed Shared-Memory Models with Bounded-Size Registers., , , , and . PODC, page 310-320. ACM, (2024)Early Stopping in Global Data Computation., , , and . IEEE Trans. Parallel Distributed Syst., 14 (9): 909-921 (2003)Black Art: Obstruction-Free k-set Agreement with |MWMR registers| < |proccesses|., , , and . NETYS, volume 7853 of Lecture Notes in Computer Science, page 28-41. Springer, (2013)Distributed Programming for Dummies: A Shifting Transformation Technique., , , and . SRDS, page 349-. IEEE Computer Society, (2003)On implementing omega with weak reliability and synchrony assumptions., , , and . PODC, page 306-314. ACM, (2003)Partial synchrony based on set timeliness., , , and . PODC, page 102-110. ACM, (2009)