Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Atomic Actions on Decentralized Data.. SOSP, page 163. ACM, (1979)Operating System Review 13(5).Collaborative storage with mobile devices in wireless networks for P2P media sharing., , and . WTS, page 69-77. IEEE, (2008)Presence Information in Mobile Mesh Networks., , , and . CCNC, page 1255-1256. IEEE, (2008)Demonstration: Croquet, a Networked Collaborative 3D Immersive Environment.. USENIX Annual Technical Conference, FREENIX Track, USENIX, (2004)Synchronization with Eventcounts and Sequencers (Extended Abstract)., and . SOSP, page 91. ACM, (1977)long version: CACM.Weapons of Math Destruction. Context Magazine, (Spring 1999)Critiquing the Layered Regulatory Model.. JTHTL, 4 (2): 281-298 (2006)End-to-End Arguments in System Design., , and . ICDCS, page 509-512. IEEE Computer Society, (1981)Naming and synchronization in a decentralized computer system.. Massachusetts Institute of Technology, Cambridge, MA, USA, (1978)ndltd.org (oai:dspace.mit.edu:1721.1/16279).Connected Consumption: The Hidden Networks of Consumption., , , , and . CCNC, page 1-5. IEEE, (2009)