From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Make Replicated Data Secure., и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 379-391. Springer, (1987)Playing with Fire: Transactional Memory Revisited for Error-Resilient and Energy-Efficient MPSoC Execution., , , , , и . ACM Great Lakes Symposium on VLSI, стр. 9-14. ACM, (2015)Blockchain: From Technology to Marketplaces., , , , и . Computer, 53 (7): 14-18 (2020)Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments., , , и . Axioms, 12 (6): 531 (июня 2023)Principles of Blockchain Systems, , , и . Synthesis Lectures on Computer Science Morgan & Claypool Publishers, (2021)FFT-based Gradient Sparsification for the Distributed Training of Deep Neural Networks., , , , , , и . HPDC, стр. 113-124. ACM, (2020)Well-structured futures and cache locality., и . PPoPP, стр. 155-166. ACM, (2014)Well-Structured Futures and Cache Locality., и . CoRR, (2013)An Algorithmic Approach to the Asynchronous Computability Theorem., , и . CoRR, (2017)A Survey on Counting Networks., и . WDAS, том 2 из Proceedings in Informatics, стр. 13-20. Carleton Scientific, (1998)