Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamically Fault-Tolerant Content Addressable Networks., , , , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 270-279. Springer, (2002)A resource-competitive jamming defense., , , and . Distributed Comput., 31 (6): 419-439 (2018)Byzantine Agreement in Expected Polynomial Time., and . J. ACM, 63 (2): 13:1-13:21 (2016)Fast asynchronous Byzantine agreement and leader election with full information., , , , and . ACM Trans. Algorithms, 6 (4): 68:1-68:28 (2010)Spectral analysis of data., , , , and . STOC, page 619-626. ACM, (2001)Brief announcement: breaking the O(nm) bit barrier, secure multiparty computation with a static adversary., , , and . PODC, page 227-228. ACM, (2012)Network Routing Models Applied to Aircraft Routing Problems., , , , and . WSC, page 1200-1206. IEEE Computer Society, (1995)An Experimental Study of Data Migration Algorithms., , , , , , , and . WAE, volume 2141 of Lecture Notes in Computer Science, page 145-158. Springer, (2001)Fraud Detection for Random Walks., , , and . ITCS, volume 287 of LIPIcs, page 36:1-36:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)Picking up the Pieces: Self-Healing in reconfigurable networks., and . IPDPS, page 1-12. IEEE, (2008)