From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems., , , , и . CoRR, (2018)Investigating the existence and the regularity of Logarithmic Harary Graphs., , , и . Theor. Comput. Sci., 410 (21-23): 2110-2121 (2009)SoK: Achieving State Machine Replication in Blockchains based on Repeated Consensus., , , и . CoRR, (2021)Reliable Broadcast Despite Mobile Byzantine Faults., , и . OPODIS, том 286 из LIPIcs, стр. 18:1-18:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Practical Byzantine Reliable Broadcast on Partially Connected Networks., , , , и . ICDCS, стр. 506-516. IEEE, (2021)On the Efficacy of Smart Contract Analysis Tools., , и . ISSREW, стр. 37-38. IEEE, (2023)k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses., , и . EWDC, стр. 99-106. ACM, (2011)An Algorithm for Implementing BFT Registers in Distributed Systems with Bounded Churn., , и . SSS, том 6976 из Lecture Notes in Computer Science, стр. 32-46. Springer, (2011)Oblivious Assignment with m Slots., , , и . SSS, том 7596 из Lecture Notes in Computer Science, стр. 187-201. Springer, (2012)Fighting Erosion in Dynamic Large-Scale Overlay Networks., , , , , и . AINA, стр. 110-117. IEEE Computer Society, (2007)