Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Theory of Transactional Memory., and . Bulletin of the EATCS, (2009)On the Weakest Failure Detector for Non-Blocking Atomic Commit., and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 461-473. Kluwer, (2002)Muteness Failure Detectors: Specification and Implementation., , , and . EDCC, volume 1667 of Lecture Notes in Computer Science, page 71-87. Springer, (1999)Differentially Private Stochastic Coordinate Descent., , , , and . CoRR, (2020)Permissiveness in Transactional Memories., , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 305-319. Springer, (2008)Optimistic Erasure-Coded Distributed Storage., , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 182-196. Springer, (2008)Fast Indulgent Consensus with Zero Degradation., and . EDCC, volume 2485 of Lecture Notes in Computer Science, page 191-208. Springer, (2002)Encapsulating Failure Detection: From Crash to Byzantine Failures., , and . Ada-Europe, volume 2361 of Lecture Notes in Computer Science, page 24-50. Springer, (2002)Gathering with extremely restricted visibility., and . CoRR, (2019)Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols., , and . CoRR, (2019)