Author of the publication

Clock Synchronization in the Byzantine-Recovery Failure Model.

, , , , and . OPODIS, volume 4878 of Lecture Notes in Computer Science, page 90-104. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond One Third Byzantine Failures., , , , and . CoRR, (2015)The Weakest Failure Detector for Message Passing Set-Agreement., , , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 109-120. Springer, (2008)An Anonymous Wait-Free Weak-Set Object Implementation., , , and . NETYS, volume 11028 of Lecture Notes in Computer Science, page 141-156. Springer, (2018)t-Resilient Immediate Snapshot Is Impossible., , , and . SIROCCO, volume 9988 of Lecture Notes in Computer Science, page 177-191. (2016)The Computational Power of Distributed Shared-Memory Models with Bounded-Size Registers., , , , and . PODC, page 310-320. ACM, (2024)Optimal algorithms for synchronous Byzantine k-set agreement., , , and . Theor. Comput. Sci., (September 2023)Latency Measures and Lower Bounds for Consensus with Failure Detectors., and . SIROCCO, volume 13 of Proceedings in Informatics, page 87-100. Carleton Scientific, (2002)Distributed Computing in the Asynchronous LOCAL model., , , and . CoRR, (2019)Secretive Birds: Privacy in Population Protocols., , , and . OPODIS, volume 4878 of Lecture Notes in Computer Science, page 329-342. Springer, (2007)Optimal Algorithms for Synchronous Byzantine k-Set Agreement., , , and . SSS, volume 13751 of Lecture Notes in Computer Science, page 178-192. Springer, (2022)