Author of the publication

Reducing the vulnerability window in distributed transactional protocols.

, , , and . PaPoC@EuroSys, page 10:1-10:4. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Beauty and the Beast Algorithm., and . ILPS, page 653. MIT Press, (1993)An Informal Introduction to LIFE., , and . ICLP Workshop on Concurrent Constraint Programming, (1993)Derflow: distributed deterministic dataflow programming for erlang., , , and . Erlang Workshop, page 51-60. ACM, (2014)A Fault Tolerant Abstraction for Transparent Distributed Programming., , and . MOZ, volume 3389 of Lecture Notes in Computer Science, page 149-160. Springer, (2004)Aquarius., , , , , , , , , and 4 other author(s). SIGARCH Comput. Archit. News, 15 (1): 22-34 (1987)Ideas for the future of Prolog inspired by Oz., and . CoRR, (2023)Software-defined data services: Interoperable and network-aware big data executions., , and . SDS, page 145-152. IEEE, (2018)Transparent speculation in geo-replicated transactional data stores., , and . HPDC, page 255-266. ACM, (2018)A Design Space for Context-Sensitive User Interfaces., , , , , and . IASSE, page 207-214. ISCA, (2005)Lock-Free Decentralized Storage for Transactional Upgrade Rollback, , , , and . 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, IEEE International, (2010)