From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting compromised routers via packet forwarding behavior., , и . IEEE Netw., 22 (2): 34-39 (2008)Detecting Malicious Packet Losses., , и . IEEE Trans. Parallel Distributed Syst., 20 (2): 191-206 (2009)Practical and low-overhead masking of failures of TCP-based servers., , , и . ACM Trans. Comput. Syst., 27 (2): 4:1-4:39 (2009)Designing Algorithms for Dependent Process Failures., и . Future Directions in Distributed Computing, том 2584 из Lecture Notes in Computer Science, стр. 24-28. Springer, (2003)Coterie Availability in Sites., и . DISC, том 3724 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2005)Scalable Causal Message Logging for Wide-Area Environments., , и . Euro-Par, том 2150 из Lecture Notes in Computer Science, стр. 864-873. Springer, (2001)High availability in a real-time system., , , и . ACM SIGOPS European Workshop, ACM, (1992)Highly-Available Services Using the Primary-Backup Approach., и . Workshop on the Management of Replicated Data, стр. 47-50. IEEE Computer Society Press, (1992)Position Paper - Deceit: A Flexible Distributed File System., , и . Workshop on the Management of Replicated Data, стр. 15-17. IEEE Computer Society Press, (1990)Locality aware redundancy allocation in nanoelectronic systems., , и . NANOARCH, стр. 24-31. IEEE Computer Society, (2008)