Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems., , , , and . CoRR, (2018)Multi-hop Byzantine Reliable Broadcast Made Practical., , and . CoRR, (2019)PASCAL: An architecture for proactive auto-scaling of distributed services., , , , , and . Future Gener. Comput. Syst., (2019)Investigating the existence and the regularity of Logarithmic Harary Graphs., , , and . Theor. Comput. Sci., 410 (21-23): 2110-2121 (2009)SoK: Achieving State Machine Replication in Blockchains based on Repeated Consensus., , , and . CoRR, (2021)An Algorithm for Implementing BFT Registers in Distributed Systems with Bounded Churn., , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 32-46. Springer, (2011)Oblivious Assignment with m Slots., , , and . SSS, volume 7596 of Lecture Notes in Computer Science, page 187-201. Springer, (2012)k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses., , and . EWDC, page 99-106. ACM, (2011)Fighting Erosion in Dynamic Large-Scale Overlay Networks., , , , , and . AINA, page 110-117. IEEE Computer Society, (2007)On the Efficacy of Smart Contract Analysis Tools., , and . ISSREW, page 37-38. IEEE, (2023)