Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lock-Unlock: Is That All? A Pragmatic Analysis of Locking in Software Systems., , , , and . ACM Trans. Comput. Syst., 36 (1): 1:1-1:149 (2018)Nested Transactions: Reviewing the Coherence Contract.. Inf. Sci., 84 (1&2): 161-172 (1995)Probabilistic and temporal failure detectors for solving distributed problems., , and . J. Parallel Distributed Comput., (2021)The PCL Theorem: Transactions cannot be Parallel, Consistent, and Live., , , and . J. ACM, 66 (1): 2:1-2:66 (2019)FLeet: Online Federated Learning via Staleness Awareness and Performance Prediction., , , , , and . ACM Trans. Intell. Syst. Technol., 13 (5): 79:1-79:30 (2022)A Classification of Various Approaches for Object-Based Parallel and Distributed Prgramming., and . Collaboration between Human and Artificial Societies, volume 1624 of Lecture Notes in Computer Science, page 3-29. Springer, (1999)On the Weakest Failure Detector for Non-Blocking Atomic Commit., and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 461-473. Kluwer, (2002)Gathering with extremely restricted visibility., and . CoRR, (2019)Strategyproof Learning: Building Trustworthy User-Generated Datasets., , and . CoRR, (2021)The Database State Machine Approach., , and . Distributed Parallel Databases, 14 (1): 71-98 (2003)