Author of the publication

How Bad Are Wrong Suspicions? Towards Adaptive Distributed Protocols.

, , , and . DSN, page 551-560. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of the Use of Qualifications on the Amazon Mechanical Turk Online Labor Market., and . Comput. Support. Cooperative Work., 26 (4-6): 837-872 (2017)BitTorrent Needs Psychiatric Guarantees: Quantifying How Vulnerable BitTorrent Swarms are to Sybil Attacks., , and . LADC, page 65-72. IEEE Computer Society, (2009)Eva: An Event-Based Framework for Developing Specialized Communication Protocols., , , , and . NCA, page 108-121. IEEE Computer Society, (2001)OurGrid: An Approach to Easily Assemble Grids with Equitable Resource Sharing., , , and . JSSPP, volume 2862 of Lecture Notes in Computer Science, page 61-86. Springer, (2003)Integrating Computer-Supported Learning and Knowledge Management through the Support of the Training Management Life Cycle., and . Wissensmanagement, page 152-155. DFKI, Kaiserslautern, (2005)A Case for Event-Driven Distributed Objects., , , and . OTM Conferences (2), volume 4276 of Lecture Notes in Computer Science, page 1705-1721. Springer, (2006)Deploying Fault-Tolerant Processing Services for Asynchronous Distributed Systems., and . LATW, page 62-73. IEEE, (2001)Scalable Resource Annotation in Peer-to-Peer Grids., , and . Peer-to-Peer Computing, page 231-234. IEEE Computer Society, (2008)A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids., , , , and . Peer-to-Peer Computing, page 193-202. IEEE Computer Society, (2006)Increasing e-Infrastructure Usability: The EELA-2 Experience., , , , and . 3PGCIC, page 332-337. IEEE Computer Society, (2010)