From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems., , , , и . CoRR, (2018)Multi-hop Byzantine Reliable Broadcast Made Practical., , и . CoRR, (2019)PASCAL: An architecture for proactive auto-scaling of distributed services., , , , , и . Future Gener. Comput. Syst., (2019)Investigating the existence and the regularity of Logarithmic Harary Graphs., , , и . Theor. Comput. Sci., 410 (21-23): 2110-2121 (2009)SoK: Achieving State Machine Replication in Blockchains based on Repeated Consensus., , , и . CoRR, (2021)An Algorithm for Implementing BFT Registers in Distributed Systems with Bounded Churn., , и . SSS, том 6976 из Lecture Notes in Computer Science, стр. 32-46. Springer, (2011)Oblivious Assignment with m Slots., , , и . SSS, том 7596 из Lecture Notes in Computer Science, стр. 187-201. Springer, (2012)k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses., , и . EWDC, стр. 99-106. ACM, (2011)Fighting Erosion in Dynamic Large-Scale Overlay Networks., , , , , и . AINA, стр. 110-117. IEEE Computer Society, (2007)On the Efficacy of Smart Contract Analysis Tools., , и . ISSREW, стр. 37-38. IEEE, (2023)