Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JobScan., and . CompSysTech, page 352-359. ACM, (2012)Brief announcement: global consistency can be easier than point-to-point communication., , , , and . PODC, page 310-311. ACM, (2009)On Composability of Reliable Unicast and Broadcast., , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 54-66. Springer, (2010)Noisy Text Data: Achilles' Heel of popular transformer based NLP models., , , and . CoRR, (2021)From Gene to Drug: A Proof of Concept for a Plausible Computational Pathway., , , , , , , , , and 8 other author(s). ISDA (1), page 1147-1152. IEEE Computer Society, (2006)Brief announcement: topology knowledge affects probabilistic reliable communication., , , , and . PODC, page 314-315. ACM, (2009)How Far Must You See To Hear Reliably., , , , , , , and . IACR Cryptology ePrint Archive, (2008)A New Look at Composition of Authenticated Byzantine Generals, , , and . CoRR, (2012)Byzantine Agreement Using Partial Authentication., , , , and . DISC, volume 6950 of Lecture Notes in Computer Science, page 389-403. Springer, (2011)Authenticated Byzantine Generals in Dual Failure Model., , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 79-91. Springer, (2010)