Author of the publication

Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance.

, and . IEEE Trans. Software Eng., 24 (6): 435-450 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 82-96. Springer, (2008)Session Guarantees with Raft and Hybrid Logical Clocks., , , , , , and . CoRR, (2018)Ensuring Average Recovery with Adversarial Scheduler., , and . OPODIS, volume 46 of LIPIcs, page 23:1-23:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Secret instantiation in ad-hoc networks., , and . Comput. Commun., 29 (2): 200-215 (2006)Logarithmic keying., , and . ACM Trans. Auton. Adapt. Syst., 3 (4): 18:1-18:18 (2008)The Complexity of Adding Multitolerance., , and . ACM Trans. Auton. Adapt. Syst., 9 (3): 15:1-15:33 (2014)MR4UM: A framework for adding fault tolerance to UML state diagrams., and . Theor. Comput. Sci., (2013)Eventually lattice-linear algorithms., and . J. Parallel Distributed Comput., (March 2024)"Slow is Fast" for wireless sensor networks in the presence of message losses., , , , and . J. Parallel Distributed Comput., (2015)Using Model Checking Techniques For Evaluating the Effectiveness of Evolutionary Computing in Synthesis of Distributed Fault-Tolerant Programs., and . GECCO, page 1119-1126. ACM, (2015)