Author of the publication

Dynamic Reconfiguration: A Tutorial (Tutorial).

, , and . OPODIS, volume 46 of LIPIcs, page 2:1-2:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Keidar, Idit
add a person with the name Keidar, Idit
 

Other publications of authors with the same name

An inheritance-based technique for building simulation proofs incrementally., , , and . ICSE, page 478-487. ACM, (2000)On Liveness of Dynamic Storage., and . SIROCCO, volume 10641 of Lecture Notes in Computer Science, page 356-376. Springer, (2017)Utilizing shared data in chip multiprocessors with the nahalal architecture., , , and . SPAA, page 1-10. ACM, (2008)Evaluating the running time of a communication round over the internet., and . PODC, page 243-252. ACM, (2002)Brahms: byzantine resilient random membership sampling., , , , and . PODC, page 145-154. ACM, (2008)EquiCast: scalable multicast with selfish users., , and . PODC, page 63-71. ACM, (2006)Session details: Session 2A: Approximation and Learning.. PODC, ACM, (2018)NearBucket-LSH: Efficient Similarity Search in P2P Networks., , , and . SISAP, volume 9939 of Lecture Notes in Computer Science, page 236-249. (2016)Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast., , and . IEEE Trans. Dependable Secur. Comput., 3 (1): 45-61 (2006)Space Bounds for Reliable Storage: Fundamental Limits of Coding (Keynote)., , , and . OPODIS, volume 46 of LIPIcs, page 4:1-4:3. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)