Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PeerReview: practical accountability for distributed systems., , and . SOSP, page 175-188. ACM, (2007)Abstracting out Byzantine Behavior., , and . From Security to Dependability, volume 06371 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)The weakest failure detectors to solve certain fundamental problems in distributed computing., , , , , and . PODC, page 338-346. ACM, (2004)The weakest failure detectors to boost obstruction-freedom., , and . Distributed Comput., 20 (6): 415-433 (2008)Failure detectors as type boosters., and . Distributed Comput., 20 (5): 343-358 (2008)Synchronizing without locks is inherently expensive., , , and . PODC, page 300-307. ACM, (2006)On the Weakest Failure Detector for Non-Blocking Atomic Commit., and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 461-473. Kluwer, (2002)A Note on Set Agreement with Omission Failures., , and . GETCO, volume 81 of Electronic Notes in Theoretical Computer Science, page 48-58. Elsevier, (2002)The Case for Byzantine Fault Detection., , and . HotDep, USENIX Association, (2006)D-Reliable Broadcast: A Probabilistic Measure of Broadcast Reliability., , and . ICDCS, page 636-643. IEEE Computer Society, (2004)