Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operation-based Merging of Hierarchical Documents., and . CAiSE Short Paper Proceedings, volume 161 of CEUR Workshop Proceedings, CEUR-WS.org, (2005)Trusternity: Auditing Transparent Log Server with Blockchain., , and . WWW (Companion Volume), page 79-80. ACM, (2018)Distributed access control for collaborative applications using CRDTs., , and . PaPoC@EuroSys, page 33-38. ACM, (2022)A Generic Undo Support for State-Based CRDTs., , and . OPODIS, volume 153 of LIPIcs, page 14:1-14:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)The thirteenth international workshop on collaborative editing systems., , , , , , and . CSCW Companion, page 299-300. ACM, (2013)The Influence of Trust Score on Cooperative Behavior., , and . ACM Trans. Internet Techn., 19 (4): 46:1-46:22 (2019)The twelfth international workshop on collaborative editing systems., , , , , , and . CSCW (Companion), page 25-26. ACM, (2012)Large Scale Trustworthy Distributed Collaborative Systems: Challenges and Prospective Solutions.. INFORSID, page 3-4. (2024)Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer., and . ARES, page 36:1-36:7. ACM, (2024)Flexible Definition and Resolution of Conflicts through Multi-level Editing., and . CollaborateCom, IEEE Computer Society / ICST, (2006)