Author of the publication

Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service.

, , and . DISC, volume 1499 of Lecture Notes in Computer Science, page 258-272. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An inheritance-based technique for building simulation proofs incrementally., , , and . ICSE, page 478-487. ACM, (2000)Parsing with Prefix and Suffix Dictionaries., and . Data Compression Conference, page 180-189. IEEE Computer Society, (1996)A Wide Area Network Simulation of Single-Round Group Membership Algorithms., and . NCA, page 159-170. IEEE Computer Society, (2005)Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms., and . IPDPS, IEEE Computer Society, (2005)A Virtually Synchronous Group Multicast Algorithm for WANs: Formal Approach., and . SIAM J. Comput., 32 (1): 78-130 (2002)Practical Principle of Least Privilege for Secure Embedded Systems., , , , , , , , , and . RTAS, page 1-13. IEEE, (2021)Leveraging Intel SGX Technology to Protect Security-Sensitive Applications., , , and . NCA, page 1-5. IEEE, (2018)Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service., , and . DISC, volume 1499 of Lecture Notes in Computer Science, page 258-272. Springer, (1998)Guest Editorial: Special Issue on Hardware Solutions for Cyber Security., , and . J. Hardw. Syst. Secur., 3 (3): 199 (2019)An inheritance-based technique for building simulation proofs incrementally., , , and . ACM Trans. Softw. Eng. Methodol., 11 (1): 63-91 (2002)