Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Epidemics to Distributed Computing, , , and . IEEE Computer, 37 (5): 60-67 (May 2004)A Classification of Various Approaches for Object-Based Parallel and Distributed Prgramming., and . Collaboration between Human and Artificial Societies, volume 1624 of Lecture Notes in Computer Science, page 3-29. Springer, (1999)Muteness Failure Detectors: Specification and Implementation., , , and . EDCC, volume 1667 of Lecture Notes in Computer Science, page 71-87. Springer, (1999)Lock-Unlock: Is That All? A Pragmatic Analysis of Locking in Software Systems., , , , and . ACM Trans. Comput. Syst., 36 (1): 1:1-1:149 (2018)Probabilistic and temporal failure detectors for solving distributed problems., , and . J. Parallel Distributed Comput., (2021)The PCL Theorem: Transactions cannot be Parallel, Consistent, and Live., , , and . J. ACM, 66 (1): 2:1-2:66 (2019)Strategyproof Learning: Building Trustworthy User-Generated Datasets., , and . CoRR, (2021)Fast Indulgent Consensus with Zero Degradation., and . EDCC, volume 2485 of Lecture Notes in Computer Science, page 191-208. Springer, (2002)Permissiveness in Transactional Memories., , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 305-319. Springer, (2008)Optimistic Erasure-Coded Distributed Storage., , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 182-196. Springer, (2008)