Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Muteness Failure Detectors: Specification and Implementation., , , and . EDCC, volume 1667 of Lecture Notes in Computer Science, page 71-87. Springer, (1999)Differentially Private Stochastic Coordinate Descent., , , , and . CoRR, (2020)From Epidemics to Distributed Computing, , , and . IEEE Computer, 37 (5): 60-67 (May 2004)Fast Indulgent Consensus with Zero Degradation., and . EDCC, volume 2485 of Lecture Notes in Computer Science, page 191-208. Springer, (2002)Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols., , and . CoRR, (2019)A Classification of Various Approaches for Object-Based Parallel and Distributed Prgramming., and . Collaboration between Human and Artificial Societies, volume 1624 of Lecture Notes in Computer Science, page 3-29. Springer, (1999)On the Weakest Failure Detector for Non-Blocking Atomic Commit., and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 461-473. Kluwer, (2002)Gathering with extremely restricted visibility., and . CoRR, (2019)Nested Transactions: Reviewing the Coherence Contract.. Inf. Sci., 84 (1&2): 161-172 (1995)Lock-Unlock: Is That All? A Pragmatic Analysis of Locking in Software Systems., , , , and . ACM Trans. Comput. Syst., 36 (1): 1:1-1:149 (2018)