From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Semi-reliable Multicast Protocol for Distributed Multimedia Applications in Large Scale Networks., , , , и . MMNS, том 3754 из Lecture Notes in Computer Science, стр. 109-120. Springer, (2005)Byzantine State Machine Replication in the Age of Blockchains: Fundamentals and Recent Results (Tutorial).. DSN-S, стр. 1. IEEE, (2023)Sharing Files Using Cloud Storage Services., , и . Euro-Par Workshops (2), том 8806 из Lecture Notes in Computer Science, стр. 13-25. Springer, (2014)On the Reliability and Availability of Systems Tolerant to Stealth Intrusion., и . LADC, стр. 35-44. IEEE Computer Society, (2011)Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations., , и . OPODIS, том 70 из LIPIcs, стр. 30:1-30:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)From Byzantine fault tolerance to intrusion tolerance (a position paper).. DSN Workshops, стр. 15-18. IEEE Computer Society, (2011)5th Workshop on recent advances in intrusion-tolerant systems WRAITS 2011., и . DSN Workshops, стр. 1-2. IEEE Computer Society, (2011)EBAWA: Efficient Byzantine Agreement for Wide-Area Networks., , , и . HASE, стр. 10-19. IEEE Computer Society, (2010)On the Efficiency of Durable State Machine Replication., , , , и . USENIX ATC, стр. 169-180. USENIX Association, (2013)Active Replication in CORBA: Standards, Protocols, and Implementation Framework., , , и . CoopIS/DOA/ODBASE (2), том 3291 из Lecture Notes in Computer Science, стр. 1395-1412. Springer, (2004)