Author of the publication

Reliably Executing Tasks in the Presence of Malicious Processors.

, , , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 490-492. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building an HLA-Based Distributed Simulation: A Metadata Approach., , and . DS-RT, page 153-160. IEEE Computer Society, (2013)Reliably Executing Tasks in the Presence of Malicious Processors., , , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 490-492. Springer, (2005)A Mechanism for Fair Distribution of Resources with Application to Sponsored Search., , and . CoRR, (2015)A Fair and Scalable Mechanism for Resource Allocation: The Multilevel QPQ Approach., , , and . IEEE Access, (2021)Performance of scheduling policies in adversarial networks with non synchronized clocks., , , , , , , , , and . ISCC, page 1071-1078. IEEE Computer Society, (2007)Comparison between transmission and scattering spectrum reconstruction methods based on EPID images., , , , , , and . EMBC, page 1640-1643. IEEE, (2013)Adversarial Queueing Model for Continuous Network Dynamics., , , , , , and . MFCS, volume 3618 of Lecture Notes in Computer Science, page 144-155. Springer, (2005)Fair Linking Mechanisms for Resource Allocation with Correlated Player Types., , , and . NETYS, volume 8593 of Lecture Notes in Computer Science, page 70-83. Springer, (2014)Monte Carlo dose estimation in patient-specific volume mesh from CT images., , , , and . CISP-BMEI, page 1590-1594. IEEE, (2016)Reliably Executing Tasks in the Presence of Untrusted Entities., , , and . SRDS, page 39-50. IEEE Computer Society, (2006)