Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sicherheit in der Informationstechnik-Verantwortungsteilung zwischen Nutzern, Wirtschaft und Staat, , , , , , , , , and 1 other author(s). INFORMATIK 2011-Informatik schafft Communities, 192, page 39. (2011)Neighborhood Preserving Hashing and Approximate Queries., , , , and . SODA, page 251-259. ACM/SIAM, (1994)Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application, , , , and . CoRR, (2008)Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries, , , and . CoRR, (2009)Some Garbage In - Some Garbage Out: Asynchronous t-Byzantine as Asynchronous Benign t-resilient system with fixed t-Trojan-Horse Inputs., and . CoRR, (2016)Implementing Mediators with Asynchronous Cheap Talk., , , and . CoRR, (2018)Linear-time Self-stabilizing Byzantine Clock Synchronization, , and . CoRR, (2006)Stateless Computation., , , , and . CoRR, (2016)Dynamic Fault-Tolerant Clock Synchronization., , , and . J. ACM, 42 (1): 143-185 (1995)LogMemcached: An RDMA based Continuous Cache Replication., , , and . KBNets@SIGCOMM, page 1-6. ACM, (2017)