From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Limitations on Database Availability when Networks Partition., , и . PODC, стр. 187-194. ACM, (1986)Self-stabilizing topology maintenance protocols for high-speed networks., , , , и . IEEE/ACM Trans. Netw., 4 (6): 902-912 (1996)Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols., , и . DBSec, том 9766 из Lecture Notes in Computer Science, стр. 52-60. Springer, (2016)Simultaneity is Harder than Agreement., и . Symposium on Reliability in Distributed Software and Database Systems, стр. 141-150. IEEE Computer Society, (1986)Modular Cosntruction of an Efficient 1-Bit Byzantine Agreement Protocol., и . Math. Syst. Theory, 26 (1): 131-154 (1993)Cryptographic Password Obfuscation., , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 497-512. Springer, (2018)Agreeing on a Leader in Real-Time., и . RTSS, стр. 166-172. IEEE Computer Society, (1990)Network QoS Assurance in a Multi-Layer Adaptive Resource Management Scheme for Mission-Critical Applications using the CORBA Middleware Framework., , , , , , и . IEEE Real-Time and Embedded Technology and Applications Symposium, стр. 246-255. IEEE Computer Society, (2005)Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols., , и . SECITC, том 12001 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2019)Byzantine replication under attack., , , и . DSN, стр. 197-206. IEEE Computer Society, (2008)