From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Malicious Packet Losses., , и . IEEE Trans. Parallel Distributed Syst., 20 (2): 191-206 (2009)High availability in a real-time system., , , и . ACM SIGOPS European Workshop, ACM, (1992)Scalable Causal Message Logging for Wide-Area Environments., , и . Euro-Par, том 2150 из Lecture Notes in Computer Science, стр. 864-873. Springer, (2001)Coterie Availability in Sites., и . DISC, том 3724 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2005)Designing Algorithms for Dependent Process Failures., и . Future Directions in Distributed Computing, том 2584 из Lecture Notes in Computer Science, стр. 24-28. Springer, (2003)Highly-Available Services Using the Primary-Backup Approach., и . Workshop on the Management of Replicated Data, стр. 47-50. IEEE Computer Society Press, (1992)Position Paper - Deceit: A Flexible Distributed File System., , и . Workshop on the Management of Replicated Data, стр. 15-17. IEEE Computer Society Press, (1990)Locality aware redundancy allocation in nanoelectronic systems., , и . NANOARCH, стр. 24-31. IEEE Computer Society, (2008)An Extensible Software Architecture for Mobile Components., , и . ECBS, стр. 231-237. IEEE Computer Society, (2002)Brief announcement: detecting malicious routers., , и . PODC, стр. 369. ACM, (2004)